Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Buffer Overflow, Shellcode, CTF, Reverse Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186306
posts in
32.3
ms
Long Term Support
Channel
Update for
ChromeOS
🚀
Astro
chromereleases.googleblog.com
·
1d
·
Blogger
Decoding
Greatness
by Ron
Friedman
, Inside Notion, and more
⏱️
productivity
wise.readwise.io
·
4d
Reverse engineered
Alienware
16X Aurora fan control on Linux via
ACPI
— full independent CPU/GPU fan speed control working
🌡️
Liquid Cooling
github.com
·
3d
·
r/archlinux
Reverse Engineering the
Proscenic
850T
Robot Vacuum
🔍
Reverse Engineering
infosecwriteups.com
·
1d
Roper
Technologies: Solid Q1, I'm
Bullish
Despite The AI Fears (NASDAQ:ROP)
📉
Time Series
seekingalpha.com
·
4d
When AI Enters the
Arena
: Students
Tackle
Cybersecurity Challenges
🛡️
Computer Security
news.syr.edu
·
6d
IP Ninja :: Fake PoC, Real Backdoor: How a
Typosquatted
Repo
Weaponized
CVE-2026-31431
🔧
Hardware Hacking
ip-ninja.com
·
18h
·
Hacker News
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🔧
Hardware Hacking
arxiv.org
·
3d
Throwing Random Arguments at System
Binaries
: Real
Segfaults
vs. Ticket Noise
⚠️
Unsafe Rust
communityblog.fedoraproject.org
·
2d
MiniRAT
: A Go-based macOS RAT delivered via malicious
NPM
package
🏗️
Cranelift
iru.com
·
1d
·
Hacker News
Exploiting
Reversing
(ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03)
🔧
Hardware Hacking
exploitreversing.com
·
2d
CVE-2026-31431: “Copy Fail” Linux kernel
flaw
lets local users gain
root
in seconds
🔍
eBPF
webflow.sysdig.com
·
1d
Dynamic
Cyber
Ranges
🔧
Hardware Hacking
arxiv.org
·
3d
Source code
sandboxing
🔍
Static Analysis
kristaps.bsd.lv
·
1d
·
r/programming
OffSec
’s
Exploit
Database Archive
⚙️
n8n
exploit-db.com
·
2d
Copy Fail exploit lets 732
bytes
hijack
Linux systems and quietly grab root
🐧
Embedded Linux
nerds.xyz
·
1d
·
r/netsec
ookatuk/Iart
: A crate that might be a reasonably useful alternative to `Result`, even at the expense of some runtime speed, whether using `no-std` or `std`.
☁️
Serverless Rust
github.com
·
5d
·
r/rust
Exploiting
Reversing
(ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03)
🔧
Hardware Hacking
malware.news
·
2d
« Page 1
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help