Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ฅ Exploit Development
exploit writing, shellcode, ROP chains, vulnerability exploitation
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187192
posts in
14.7
ms
Metasploit
Wrap-Up
04/25/2026
ย
๐ฌ
Security Research
rapid7.com
ยท
6d
Wiz Finds GitHub RCE ๐,
DPRK
AI Targets Devs ๐ต๏ธ, OWASP
FinBot
CTF Live ๐ค
ย
๐ฌ
Security Research
tldr.tech
ยท
1d
Article:
CodeGuardian
: A Model Context Protocol Server for AI-Assisted Code Quality Analysis and Security
Scanning
ย
๐
Web App Security
infoq.com
ยท
2d
The
Embedded
Rustacean
Issue #70
ย
๐ง
Hardware Hacking
theembeddedrustacean.com
ยท
6d
ยท
r/rust
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
ย
๐
Penetration Testing
snyk.io
ยท
1d
LLM-Guided Issue Generation from
Uncovered
Code
Segments
ย
๐
Fuzzing
arxiv.org
ยท
21h
MacOS malware persistence 11:
osascript
LOLBin
. Simple C example
ย
โ๏ธ
Binary Exploitation
malware.news
ยท
22h
Throwing Random Arguments at System
Binaries
: Real
Segfaults
vs. Ticket Noise
ย
โ๏ธ
Binary Exploitation
communityblog.fedoraproject.org
ยท
2d
On the software supply-chain
doom
spiral
ย
๐ง
Hardware Hacking
tylercipriani.com
ยท
6d
ยท
Hacker News
From Scanner to
Stealer
: Inside the
trivy-action
Supply Chain Compromise
ย
๐
Penetration Testing
crowdstrike.com
ยท
2d
Security Software: Holding the
Vault
Door Open for
Criminals
ย
๐ง
Hardware Hacking
jericho.blog
ยท
3d
A Day with Developer
Assist
: Faster Fixes,
Cleaner
Commits
ย
โ๏ธ
Reverse Engineering
devops.com
ยท
1d
How I Built a Rust CLI Tool That Beats
POSIX
diff
(and Saved My CI/CD Pipelines)
ย
โ๏ธ
Binary Exploitation
medium.com
ยท
2d
Claude Code Guide:
Templates
, Security,
Workflows
ย
โ๏ธ
Reverse Engineering
cc.bruniaux.com
ยท
6d
Someone
compromised
SAP
's npm packages and used the CI pipeline against itself
ย
๐ง
Hardware Hacking
safedep.io
ยท
1d
ยท
Hacker News
,
r/programming
Vulnerabilities
in
Ollama
software
ย
๐ ๏ธ
Ghidra
cert.pl
ยท
1d
Github Highlights
ย
๐ ๏ธ
Ghidra
blog.armbian.com
ยท
3d
How to Apply
STRIDE
Threat Modeling and
SonarQube
Analysis for Secure Software Development
ย
๐ต๏ธ
Threat Intelligence
freecodecamp.org
ยท
2d
Carnival Breached 7.5M ๐ข,
DPRK
IT Worker
Tradecraft
๐ฐ๐ต , FCC Bans Foreign Routers ๐ถ
ย
๐ง
Hardware Hacking
tldr.tech
ยท
4d
Research
Sabotage
in ML
Codebases
ย
๐
Penetration Testing
lesswrong.com
ยท
1d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help