Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🚩 CTF
Specific
capture the flag, CTF challenges, writeups, HackTheBox
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
61
posts in
11.2
ms
AI agents show they can create
exploits
, not just find vulns
🔓
Penetration Testing
theregister.com
·
5d
AI vs processes 🗳, faster code search 🔍, AI as a ticking time bomb 💣
🕵️
Threat Intelligence
tldr.tech
·
3d
TryHackMe
Walkthrough: CVE-2026–31431
⚙️
Binary Exploitation
infosecwriteups.com
·
6d
Bay Summer Solstice 2026
🔍
OSINT
lesswrong.com
·
3d
The Places We're Losing Are Becoming Jakob Steensen's Worlds
🛠️
Ghidra
killscreen.com
·
1d
Pathfinding Labs: Deploy, test, and learn from 100+ intentionally vulnerable AWS environments
🔓
Penetration Testing
securitylabs.datadoghq.com
·
3d
·
r/netsec
Omniscient Reader's Viewpoint Volume 3 Novel Review
📚
Reading
animenewsnetwork.com
·
6d
Interview: J.D. Amato and Sophie Morse tap into their childhood experiences for debut graphic novel THE ENDLESS GAME
📚
Reading
comicsbeat.com
·
5d
Gaza's remote workers keep coding in spite of Israeli drone strikes and the constant screams of ambulances in the distance, which is still probably better than having to go back into an office just to sit on Teams meetings
🎭
Social Engineering
fark.com
·
5d
A grad student and coach, Moser connects economics and esports
🔴
Red Teaming
boisestate.edu
·
6d
Gyōmuyōmochi Launches New Manga in July
🛠️
Ghidra
animenewsnetwork.com
·
6d
Overwatch
HTB
—
HackTheBox
Walkthrough
💥
Cyberattack
infosecwriteups.com
·
5d
Sentinels League 2026: Live Rankings for the Threat Hunting World Championship
🕵️
Threat Intelligence
sentinelone.com
·
15h
The End of the
Exploit
Window: How Frontier AI Is Changing CVE Prioritization
💥
Exploit Development
bitsight.com
·
6h
IronCorp — DNS Zone Transfer → SSRF → Command Injection → SYSTEM
📡
Network Security
infosecwriteups.com
·
6d
Learning-focused
CTFs
are Facing a Restructure
🔴
Red Teaming
exploiting.systems
·
3d
·
Hacker News
How are people threat-modeling local agents with tool access?
🕵️
Threat Intelligence
armorerlabs.com
·
1d
·
r/mcp
Michael Tsai - Blog - Memory Integrity Enforcement
Exploit
⚙️
Binary Exploitation
mjtsai.com
·
2d
Project Glasswing: what Mythos showed us
🛠️
Ghidra
news.ycombinator.com
·
1d
·
Hacker News
London Playbook PM: Makerfield me a winner
🐛
Fuzzing
politico.eu
·
1d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help