Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💥 Exploit Development
exploit writing, shellcode, ROP chains, vulnerability exploitation
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
148739
posts in
11.7
ms
The
Mechanics
of
Shellcode
: A Blueprint for Exploitation
⚙️
Binary Exploitation
medium.com
·
3d
Anthropic
Mythos
, Security Program Politics, Vulnerability Research is
Cooked
🔬
Security Research
tldrsec.com
·
15h
another memory
corruption
case
🐛
Fuzzing
trofi.github.io
·
2d
·
Lobsters
,
Hacker News
VU#536588: Multiple Heap Buffer Overflows in
Orthanc
DICOM
Server
⚙️
Binary Exploitation
kb.cert.org
·
15h
Claude Code found a Linux
vulnerability
hidden for 23 years
⚙️
Binary Exploitation
blog.adafruit.com
·
2d
DebugHarness
:
Emulating
Human Dynamic Debugging for Autonomous Program Repair
🐛
Fuzzing
arxiv.org
·
3d
On LLMs and
Vulnerability
Research
🔬
Security Research
devansh.bearblog.dev
·
3d
Vulnerability Research Isn’t
Cooked
; It’s
Burned
Beyond Recognition
🔬
Security Research
jericho.blog
·
3d
Understanding
Buffer
Overflows
: From Fundamentals to Real-World Impact
⚙️
Binary Exploitation
medium.com
·
5d
OffSec
’s
Exploit
Database Archive
⚙️
Binary Exploitation
exploit-db.com
·
2d
Vulnerability
Research Is
Cooked
🔬
Security Research
simonwillison.net
·
6d
Part II — Third-party
libraries
: the vulnerability layer nobody
counted
🔓
Penetration Testing
securesql.info
·
15h
The
Blueprint
of a North
Korean
Attack on Open-Source
⚙️
Binary Exploitation
casco.com
·
2d
·
Hacker News
,
r/javascript
Why
.env
files are a security
disaster
(and what we do instead)
⚙️
Binary Exploitation
runenv.dev
·
18h
·
DEV
TryHackMe
Cyber Security 101: From
Curiosity
to Real Understanding
📡
Network Security
medium.com
·
12h
VulnHub
Writeup
🔬
Security Research
medium.com
·
1d
We let
OpenClaw
loose
on an internal network. Here’s what it found
🔓
Penetration Testing
sophos.com
·
13h
·
Hacker News
hamzamiladin/Vulnchain
: AI-powered multi-language security scanner: 154 Semgrep rules, 13 Joern CPG scripts, AI code detection, and attack-chain correlation
🛠️
Ghidra
github.com
·
2d
·
DEV
Defending Buffer
Overflows
in WebAssembly: A
Transpiler
Approach
⚙️
Binary Exploitation
arxiv.org
·
3d
Yu –
Sandboxes
your Claude Code/Codex with zero
credential
exposure
⚙️
Binary Exploitation
blog.dreambubble.ai
·
1d
·
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help