Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⚙️ Binary Exploitation
Specific
buffer overflow, heap exploitation, pwn, ELF binaries
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186409
posts in
18.9
ms
Reverse engineering
Adobe
’s
gamut
mapping
🐛
Fuzzing
blog.kasson.com
·
3d
Reverse engineered
Alienware
16X Aurora fan control on Linux via
ACPI
— full independent CPU/GPU fan speed control working
🔧
Hardware Hacking
github.com
·
2d
·
r/archlinux
UMD
CTF
2026
🚩
CTF
nukeofficial.medium.com
·
1d
When AI Enters the
Arena
: Students
Tackle
Cybersecurity Challenges
🛡️
Cybersecurity
news.syr.edu
·
6d
Roper
Technologies: Solid Q1, I'm
Bullish
Despite The AI Fears (NASDAQ:ROP)
🕵️
Threat Intelligence
seekingalpha.com
·
4d
Reverse Engineering the
Proscenic
850T
Robot Vacuum
🛠️
Ghidra
infosecwriteups.com
·
1d
Decoding
Greatness
by Ron
Friedman
, Inside Notion, and more
📚
Reading
wise.readwise.io
·
4d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🔐
Cryptography
arxiv.org
·
2d
Feature Interview:
Nicholas
Carlini
, Anthropic
🔴
Red Teaming
risky.biz
·
6d
Dynamic
Cyber
Ranges
🕵️
Threat Intelligence
arxiv.org
·
2d
« Page 1
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help