Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⚙️ Binary Exploitation
Specific
buffer overflow, heap exploitation, pwn, ELF binaries
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
148926
posts in
11.1
ms
The
Mechanics
of
Shellcode
: A Blueprint for Exploitation
💥
Exploit Development
medium.com
·
3d
Can LLMs
Deobfuscate
Binary Code? A Systematic Analysis of Large Language Models into
Pseudocode
Deobfuscation
🐛
Fuzzing
arxiv.org
·
3h
another memory
corruption
case
🐛
Fuzzing
trofi.github.io
·
2d
·
Lobsters
,
Hacker News
aloshdenny/reverse-SynthID
: reverse engineering Gemini's
SynthID
detection
🔧
Hardware Hacking
github.com
·
11h
·
Hacker News
CVE-2026-31402
: Linux
NFS
Bug Hidden for 23 Years
🔬
Security Research
youtube.com
·
1d
FOWSNIFF
CTF
WALKTHROUGH
🚩
CTF
medium.com
·
15h
Understanding
Buffer
Overflows
: From Fundamentals to Real-World Impact
💥
Exploit Development
medium.com
·
5d
DevSecOps
Isn’t Just Security — It’s Understanding the System
💥
Exploit Development
medium.com
·
10h
Inside a Phishing Attack:
TryHackMe
First Shift
CTF
🎭
Social Engineering
medium.com
·
2d
I Bought 1,000
Biometric
Security
Pods
for $0: A CTF Story
🎭
Social Engineering
medium.com
·
2h
Belkin
F9K1122
Buffer Overflow CVE-2026-5608
Exploitable
💥
Exploit Development
medium.com
·
3d
Dots,
Dashes
, and Deception: How I Cracked
BSides
Seattle’s Cryptography CTF
🔧
Hardware Hacking
medium.com
·
2d
RITSEC
CTF-2026:
Zipped
Up writeup
🚩
CTF
medium.com
·
2d
QED-Lite
: Lightweight Detection of Quantum-Vulnerable ELF
Binaries
via Cryptographic Library Version Fingerprinting
🔧
Hardware Hacking
eprint.iacr.org
·
5d
I received a phishing email on Easter. I
dismantled
a criminal organization. The chocolate egg is still
wrapped
.
💥
Cyberattack
paolocostanzo.github.io
·
2d
·
DEV
Letsdefend
Walkthrough: Reverse Engineering a P2P Malware
DLL
🛠️
Ghidra
danyelpaius.medium.com
·
6d
How Pizza Tycoon (1994)
simulated
traffic on a 25
MHz
CPU
🔴
Red Teaming
pizzalegacy.nl
·
1d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/coding
,
r/programming
Reverse
Engineering
RustImplant
💥
Exploit Development
blog.yeethsecurity.com
·
4d
·
r/Malware
After years of '
extensive
reverse engineering', you can play a
janky
Mirror's Edge prototype in all its glory
⚙️
Reverse Engineering
pcgamer.com
·
1d
Alice
GG
• Protecting Godot games against reverse engineering
🔐
Cryptography
alicegg.tech
·
6d
·
Hacker News
,
r/godot
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help