Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⚙️ Binary Exploitation
Specific
buffer overflow, heap exploitation, pwn, ELF binaries
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
147926
posts in
53.6
ms
The
Mechanics
of
Shellcode
: A Blueprint for Exploitation
💥
Exploit Development
medium.com
·
3d
CREBench
: Evaluating Large Language Models in
Cryptographic
Binary Reverse Engineering
⚙️
Reverse Engineering
arxiv.org
·
2d
aloshdenny/reverse-SynthID
: reverse engineering Gemini's
SynthID
detection
🔧
Hardware Hacking
github.com
·
6h
·
Hacker News
DevSecOps
Isn’t Just Security — It’s Understanding the System
💥
Exploit Development
medium.com
·
5h
another memory
corruption
case
🐛
Fuzzing
trofi.github.io
·
2d
·
Lobsters
,
Hacker News
FOWSNIFF
CTF
WALKTHROUGH
🚩
CTF
medium.com
·
10h
Understanding
Buffer
Overflows
: From Fundamentals to Real-World Impact
💥
Exploit Development
medium.com
·
5d
CVE-2026-31402
: Linux
NFS
Bug Hidden for 23 Years
🔬
Security Research
youtube.com
·
1d
Inside a Phishing Attack:
TryHackMe
First Shift
CTF
🎭
Social Engineering
medium.com
·
2d
Belkin
F9K1122
Buffer Overflow CVE-2026-5608
Exploitable
💥
Exploit Development
medium.com
·
3d
Dots,
Dashes
, and Deception: How I Cracked
BSides
Seattle’s Cryptography CTF
🔧
Hardware Hacking
medium.com
·
1d
QED-Lite
: Lightweight Detection of Quantum-Vulnerable ELF
Binaries
via Cryptographic Library Version Fingerprinting
🔧
Hardware Hacking
eprint.iacr.org
·
4d
RITSEC
CTF-2026:
Zipped
Up writeup
🚩
CTF
medium.com
·
2d
Letsdefend
Walkthrough: Reverse Engineering a P2P Malware
DLL
🛠️
Ghidra
danyelpaius.medium.com
·
6d
I received a phishing email on Easter. I
dismantled
a criminal organization. The chocolate egg is still
wrapped
.
💥
Cyberattack
paolocostanzo.github.io
·
1d
·
DEV
How Pizza Tycoon (1994)
simulated
traffic on a 25
MHz
CPU
🔴
Red Teaming
pizzalegacy.nl
·
1d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/coding
,
r/programming
Reverse
Engineering
RustImplant
💥
Exploit Development
blog.yeethsecurity.com
·
4d
·
r/Malware
Reverse Engineering a WhatsApp
0-Click
Vulnerability: A Deep Dive into
CVE-2025
–43300
🔧
Hardware Hacking
infosecwriteups.com
·
6d
Polymarket plans to launch the CTF Exchange V2 upgrade within the next three weeks, including a
rebuilt
trading engine and a native,
USDC-backed
USD stablecoin ...
🚩
CTF
techmeme.com
·
2d
After years of '
extensive
reverse engineering', you can play a
janky
Mirror's Edge prototype in all its glory
⚙️
Reverse Engineering
pcgamer.com
·
1d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help