Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💻 Hacking
penetration testing, CTF, exploit, ethical hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
172253
posts in
24.8
ms
What Is
Penetration
Testing A Guide to Modern Security
dupple.com
·
13h
🔐
Cybersecurity
Footprinting
and
Reconnaissance
: The Art of Information Gathering in Ethical Hacking
medium.com
·
2d
🔐
Cybersecurity
Why I Spent Weeks Building a
Hacking
Platform
Nobody
Asked For
medium.com
·
2h
🛠️
InfoSec Tools
Ethical
Hacking for Beginners — Day 2:
Viruses
, Malware, Cyber Attacks & Security Testing
osintteam.blog
·
18h
🔐
Cybersecurity
I built a browser-based
multiplayer
hacking
sim
— here's how the Red vs Blue system works
ghost-net.org
·
21h
·
Discuss:
DEV
🔐
Cybersecurity
CySecurity News - Latest Information Security and Hacking Incidents:
APT28
Deploys Enhanced Version of
Covenant
in Ongoing Threat Activity
cysecurity.news
·
8h
·
Discuss:
Blogger
🛠️
InfoSec Tools
Impacket
for Pentester:
MSSQL
Exploitation
rajhackingarticles.blogspot.com
·
9h
·
Discuss:
rajhackingarticles.blogspot.com
🛠️
InfoSec Tools
Hacking
Workshop
for April/May 2026
rhaas.blogspot.com
·
2d
·
Discuss:
rhaas.blogspot.com
🔐
Cybersecurity
Hacking
a Robot
Vacuum
schneier.com
·
1d
🛠️
InfoSec Tools
matrixleons/evilwaf
:
evilwaf
is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
github.com
·
11h
·
Discuss:
Hacker News
🔐
Cybersecurity
7,500+
Magento
sites
defaced
in global hacking campaign
securityaffairs.com
·
41m
🔐
Cybersecurity
Hack.lu
CTF
2026
ctftime.org
·
1d
🔐
Cybersecurity
Hackers
Exploit
Critical
Langflow
Bug in Just 20 Hours
infosecurity-magazine.com
·
12h
🔐
Cybersecurity
DarkSword
turns iPhone
hacking
into a mass-scale, drive-by threat
metacurity.com
·
1d
🔐
Cybersecurity
A Practical Web
Pentesting
CTF
Challenge
infosecwriteups.com
·
5d
🔐
Cybersecurity
AI
probably
does lead to more computer security
disasters
algorithmwatch.org
·
17h
🔐
Cybersecurity
54
EDR
Killers Use
BYOVD
to Exploit 34 Signed Vulnerable Drivers and Disable Security
thehackernews.com
·
1d
🛠️
InfoSec Tools
CySecurity
News - Latest Information Security and Hacking Incidents: How a
Brute-Force
Attack Exposed a Wider Ransomware Ecosystem
cysecurity.news
·
2d
·
Discuss:
Blogger
🔐
Cybersecurity
Russian hackers
exploit
Zimbra
flaw in Ukrainian govt attacks
databreaches.net
·
1d
🔐
Cybersecurity
Phineas
Fisher: The Evolution of a Master
Hacktivist
hackernoon.com
·
1h
🔐
Cybersecurity
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help