Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
5817
posts in
34.5
ms
Alice
GG
• Protecting Godot games against reverse engineering
🎮
Godot
alicegg.tech
·
5d
·
Hacker News
,
r/godot
another memory
corruption
case
⚙
Risc-v
trofi.github.io
·
1d
·
Lobsters
,
Hacker News
How Pizza Tycoon (1994)
simulated
traffic on a 25
MHz
CPU
💪
ARM Architecture
pizzalegacy.nl
·
11h
·
Lobsters
,
Hacker News
,
r/coding
,
r/programming
Spilling
the Neural
Tea
: A Journey Down the Side-Channel
💻
Local LLMs
sigarch.org
·
2d
·
Hacker News
From
bytecode
to bytes: automated magic
packet
generation
🐛
Fuzzing
blog.cloudflare.com
·
20h
·
Hacker News
[
RFC
] Mitigating unexpected
arithmetic
overflow
🔄
C to Rust Translation
lkml.org
·
3h
·
Hacker News
A fully reproducible C
toolchain
rooted on
POSIX
shell
🔄
C to Rust Translation
umontreal.scholaris.ca
·
5d
·
Hacker News
The
Blueprint
of a North
Korean
Attack on Open-Source
☁️
Serverless Rust
casco.com
·
1d
·
Hacker News
,
r/javascript
hamzamiladin/Vulnchain
: AI-powered multi-language security scanner: 154 Semgrep rules, 13 Joern CPG scripts, AI code detection, and attack-chain correlation
🔍
Static Analysis
github.com
·
2d
·
Hacker News
Automatic removal of
junk
instructions
through state tracking (2018)
🔍
Reverse Engineering
usualsuspect.re
·
4d
·
Hacker News
When the
compiler
lies
: breaking memory safety in safe Go
🔄
C to Rust Translation
ciolek.dev
·
1d
·
Lobsters
,
Hacker News
A tail-call
interpreter
in (
nightly
) Rust
🦀
Rust Macros
mattkeeter.com
·
3d
·
Lobsters
,
Hacker News
,
r/rust
Scaling AI
Vulnerability
Scanning
Beyond One File at a Time
🔍
Static Analysis
brian-chastain.com
·
1d
·
Hacker News
Yu –
Sandboxes
your Claude Code/Codex with zero
credential
exposure
☁️
Serverless Rust
blog.dreambubble.ai
·
1d
·
Hacker News
Friday Archaeology: A Quarter-Century-Old Crypto Library, the Cult of the Dead Cow, and a
Rijndael
Buffer
Overwrite
🔍
Reverse Engineering
llama.gs
·
5d
·
Hacker News
Disgruntled
researcher leaks “
BlueHammer
” Windows zero-day exploit
🔍
eBPF
bleepingcomputer.com
·
2d
·
Hacker News
,
Hacker News
Linux
Executes
Binaries
: ELF and Dynamic Linking Explained
🔍
eBPF
fmdlc.github.io
·
2d
·
Hacker News
Getting root on on
TP-Link
Smart
Switches
using CVE-2026-1668
🐧
Embedded Linux
blog.tangrs.id.au
·
3d
·
Lobsters
Darksp33d/hyperhives-macos-infostealer-analysis
: Full static analysis of
HyperHives
macOS Rust infostealer — 571 decrypted config values, C2 infrastructure, DPRK/Contagious Interview attribution, YARA/Sigma rules, STIX 2.1 bundle, ATT&CK Navigator layer
🔍
Reverse Engineering
github.com
·
2d
·
Hacker News
Autonomous
Vulnerability
Hunting
with MCP
🚀
MLOps
blog.zsec.uk
·
4d
·
Hacker News
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help