Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
馃挜 Exploit Development
exploit writing, shellcode, ROP chains, vulnerability exploitation
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187192
posts in
33.8
ms
Exploiting
Reversing
(ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03)
聽
鈿欙笍
Binary Exploitation
malware.news
路
2d
Feature Interview:
Nicholas
Carlini
, Anthropic
聽
馃敶
Red Teaming
risky.biz
路
6d
ShellForge
: Building a Constraint-Aware
Shellcode
Generator from Scratch
聽
鈿欙笍
Binary Exploitation
infosecwriteups.com
路
1d
DeepZero
: Automated
Vulnerability
Research at Scale
聽
馃敩
Security Research
blog.ahmadz.ai
路
2d
路
r/SideProject
,
r/netsec
Top open source
PyPI
package with over 1 million
downloads
each month hacked to send out malware
聽
鈿欙笍
Binary Exploitation
techradar.com
路
2d
ELA-1699-1
ffmpeg
security update (by )
聽
鈿欙笍
Binary Exploitation
freexian.com
路
2d
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
聽
鈿欙笍
Binary Exploitation
github.com
路
10h
路
Hacker News
MCP
Pitfall
Lab:
Exposing
Developer Pitfalls in MCP Tool Server Security under Multi-Vector Attacks
聽
馃攼
Cryptography
arxiv.org
路
6d
AI Auto
Exploiting
Vulnerabilities, GitHub
RCE
, Autonomous Cloud Hacking Agent
聽
馃敁
Penetration Testing
tldrsec.com
路
11h
IP Ninja :: Fake PoC, Real Backdoor: How a
Typosquatted
Repo
Weaponized
CVE-2026-31431
聽
鈿欙笍
Binary Exploitation
ip-ninja.com
路
16h
路
Hacker News
The most severe Linux threat to surface in years
catches
the world
flatfooted
聽
鈿欙笍
Binary Exploitation
arstechnica.com
路
5h
路
Hacker News
Anatomy
of a Vibe Coding Breach: Lessons from 2026鈥檚 Worst
Incidents
(Part 3)
聽
馃敁
Penetration Testing
simonroses.com
路
11h
Constantine
:
Locates
Fatal Security Bugs in Software
聽
馃敩
Security Research
docs.praetorian.com
路
3d
路
Hacker News
I Built a
WebAssembly
Runtime
in 5 Days
聽
鈿欙笍
Binary Exploitation
tingouw.com
路
12h
路
Hacker News
Remote Code Execution in GitHub Enterprise Server via
Git
Push Injection (
CVE-2026-3854
)
聽
馃挜
Cyber Attacks
orca.security
路
7h
OffSec
鈥檚
Exploit
Database Archive
聽
馃寪
Web App Security
exploit-db.com
路
2d
Finding
Vulnerabilities
with
Warden
聽
馃敁
Penetration Testing
cra.mr
路
3d
路
Hacker News
Claude
Mythos
Finds Zero-Days鈥擝ut Rust Quietly
Shuts
The Door
聽
馃敁
Penetration Testing
spectrum.ieee.org
路
11h
The Final
Form
of Software Development
聽
鈿欙笍
Reverse Engineering
blog.zksecurity.xyz
路
1d
路
Lobsters
,
Hacker News
Effective testing
techniques
for developers to build
resilient
software
聽
馃悰
Fuzzing
antithesis.com
路
9h
路
Lobsters
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help