Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Penetration Testing
pentesting, ethical hacking, red team, exploits
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187421
posts in
35.5
ms
ABB
AWIN
Gateways
📡
Network Security
cisa.gov
·
1d
PhantomCore
Exploits
TrueConf
Vulnerabilities to Breach Russian Networks
💥
Cyberattack
thehackernews.com
·
4d
Towards a critical space theory: The
instrumental
politics of space
exploitation
🔍
OSINT
journals.sagepub.com
·
20h
Anthropic launches Claude Security to counter
rapid
AI-Powered
exploits
💥
Cyberattack
securityaffairs.com
·
1d
CVE-2026-42208: Targeted SQL injection against
LiteLLM
's authentication path discovered 36 hours following vulnerability
disclosure
💥
Cyberattack
webflow.sysdig.com
·
5d
Enhancing Linux
Privilege
Escalation Attack
Capabilities
of Local LLM Agents
⚙️
Binary Exploitation
arxiv.org
·
1d
Footprinting
and Scanning CTF Walkthrough: Reconnaissance Using
Nmap
& Web Enumeration
🔍
OSINT
medium.com
·
1d
B & S About Movies podcast Episode 135:
Doris
Wishman
📚
Reading
bandsaboutmovies.com
·
19h
Ehxb
| Password
Spraying
Attacks on AD
📡
Network Security
infosecwriteups.com
·
6d
Secure
AI and Agent Coding Policy
🕵️
Threat Intelligence
galdren.com
·
2d
·
Hacker News
Why a Decade of Writing Detection Logic Makes the
Mythos
Exploit Numbers Less
Scary
🕵️
Threat Intelligence
magonia.io
·
5d
·
r/netsec
As someone who works on the Linux kernel's cryptography code, the
regularly
occu
...
🔐
Cryptography
news.ycombinator.com
·
2d
·
Hacker News
Wiz
: AI is infrastructure, even if not everyone
realizes
it yet
🕵️
Threat Intelligence
techzine.eu
·
2d
How To Stop Losing Money To
DeFi
Hacks
🔧
Hardware Hacking
systematiclongshort.com
·
4d
A cybersecurity
harbinger
:
Oracle
front-runs AI model threat with new customer security advisory
🕵️
Threat Intelligence
siliconangle.com
·
1d
Buthis404/RootNotes
: self-hosted red team workspace for tracking projects, notes, hosts, credentials, findings, loot, objectives, scope, and attack paths in one interface
💥
Exploit Development
github.com
·
3d
·
Hacker News
Anthropic Unveils Claude Security to
Counter
AI-Powered
Exploit
Surge
💥
Cyberattack
securityweek.com
·
1d
Securing
the git push pipeline:
Responding
to a critical remote code execution vulnerability
💥
Exploit Development
github.blog
·
3d
Anthropic announces Claude Security public
beta
to find and fix software
vulnerabilities
💿
software
siliconangle.com
·
1d
Malicious
AI Prompt Injection Attacks Increasing, but
Sophistication
Still Low: Google
🌐
Web App Security
securityweek.com
·
4d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help