Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Binary Exploitation
Specific
buffer overflow, heap exploitation, pwn, memory corruption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
148851
posts in
10.9
ms
Understanding
Buffer
Overflows
: From Fundamentals to Real-World Impact
🧠
Memory Safety
medium.com
·
5d
another memory
corruption
case
⚡
Fault Injection
trofi.github.io
·
2d
·
Lobsters
,
Hacker News
Can LLMs
Deobfuscate
Binary Code? A Systematic Analysis of Large Language Models into
Pseudocode
Deobfuscation
🌀
Obfuscation
arxiv.org
·
3h
aloshdenny/reverse-SynthID
: reverse engineering Gemini's
SynthID
detection
🔩
Hardware Hacking
github.com
·
11h
·
Hacker News
Inside a Phishing Attack:
TryHackMe
First Shift
CTF
📱
ARM Exploitation
medium.com
·
2d
I Bought 1,000
Biometric
Security
Pods
for $0: A CTF Story
🔩
Hardware Hacking
medium.com
·
2h
QED-Lite
: Lightweight Detection of Quantum-Vulnerable ELF
Binaries
via Cryptographic Library Version Fingerprinting
🔩
Hardware Hacking
eprint.iacr.org
·
5d
FOWSNIFF
CTF
WALKTHROUGH
🚩
CTF
medium.com
·
15h
CVE-2026-31402
: Linux
NFS
Bug Hidden for 23 Years
🔓
Hypervisor Escapes
youtube.com
·
1d
DevSecOps
Isn’t Just Security — It’s Understanding the System
🔩
Hardware Hacking
medium.com
·
10h
Belkin
F9K1122
Buffer Overflow CVE-2026-5608
Exploitable
🔓
Hypervisor Escapes
medium.com
·
3d
I received a phishing email on Easter. I
dismantled
a criminal organization. The chocolate egg is still
wrapped
.
🌀
Obfuscation
paolocostanzo.github.io
·
2d
·
DEV
Dots,
Dashes
, and Deception: How I Cracked
BSides
Seattle’s Cryptography CTF
🔩
Hardware Hacking
medium.com
·
2d
Letsdefend
Walkthrough: Reverse Engineering a P2P Malware
DLL
🔍
Reverse Engineering
danyelpaius.medium.com
·
6d
How Pizza Tycoon (1994)
simulated
traffic on a 25
MHz
CPU
🎮
Game Engines
pizzalegacy.nl
·
1d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/coding
,
r/programming
The
Mechanics
of
Shellcode
: A Blueprint for Exploitation
💣
Exploits
medium.com
·
3d
RITSEC
CTF-2026:
Zipped
Up writeup
🔒
CFI
medium.com
·
2d
Reverse
Engineering
RustImplant
💣
Exploits
blog.yeethsecurity.com
·
4d
·
r/Malware
Polymarket plans to launch the CTF Exchange V2 upgrade within the next three weeks, including a
rebuilt
trading engine and a native,
USDC-backed
USD stablecoin ...
🚩
CTF
techmeme.com
·
2d
LLM4CodeRE
: Generative AI for Code
Decompilation
Analysis and Reverse Engineering
🔍
Reverse Engineering
arxiv.org
·
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help