Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💣 Exploits
exploit development, vulnerability, ROP, shellcode, CVE
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
149456
posts in
11.1
ms
OffSec
’s
Exploit
Database Archive
🔓
Binary Exploitation
exploit-db.com
·
2d
Part II — Third-party
libraries
: the vulnerability layer nobody
counted
🔓
Binary Exploitation
securesql.info
·
18h
From Late March to Early April 2026: Active
Exploits
and Supply Chain Attacks
Intensify
Across…
🔓
Binary Exploitation
medium.com
·
6d
Vulnerability
Abundance
: A
formal
proof of infinite vulnerabilities in code
🔓
Binary Exploitation
arxiv.org
·
4h
Attackers
exploit critical
Flowise
flaw CVE-2025-59528 for remote code execution
🌐
Browser Security
securityaffairs.com
·
2d
Vulnerability-Lookup
4.4.0
🔌
Embedded Security
lemmy.ml
·
21h
Metasploit
Wrap-Up
04/03/2026
📱
ARM Exploitation
rapid7.com
·
6d
Worms
, Wipes, and
RCEs
: Cyber Threats rising in the AI era
🔓
Hypervisor Escapes
medium.com
·
1d
.env
is safe but your –/.claude is not
🛡️
Anti-Cheat
github.com
·
2d
·
Hacker News
The
Mechanics
of
Shellcode
: A Blueprint for Exploitation
🐧
Kernel Exploitation
medium.com
·
3d
Marimo
OSS Python Notebook
RCE
: From Disclosure to Exploitation in Under 10 Hours
🐧
Kernel Exploitation
webflow.sysdig.com
·
1d
Getting root on on
TP-Link
Smart
Switches
using CVE-2026-1668
🐧
Kernel Exploitation
blog.tangrs.id.au
·
4d
·
Lobsters
Nix
CVE
🔓
Hypervisor Escapes
lobste.rs
·
2d
·
Lobsters
Max
severity
Flowise
RCE vulnerability now exploited in attacks
🔓
Binary Exploitation
bleepingcomputer.com
·
2d
·
Hacker News
Progress
ShareFile
Flaws CVE-2026-2699 & CVE-2026-2701
RCE
🔓
Binary Exploitation
malware.news
·
6d
TrueConf
Update Channel Breach Leads to Supply Chain Attack (
CVE-2026
–3502)
🔌
Embedded Security
medium.com
·
1d
From Malware and Exploits to Apps and
Identities
: How the Browser Became the
Battleground
🌐
Browser Security
guidepointsecurity.com
·
1d
CVE-2026-33579
🔓
Binary Exploitation
nvd.nist.gov
·
5d
The Race to Ship AI Tools Left Security Behind. Part 1:
Sandbox
Escape
🔐
Secure Enclaves
cymulate.com
·
2d
·
r/netsec
Critical
Cybersecurity
and
DevOps
News Updates | 2026.04.04
🐧
Kernel Exploitation
pithycyborg.substack.com
·
5d
·
DEV
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help