Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💥 Exploit Development
Specific
exploit writing, vulnerability research, shellcode, pwn
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
147301
posts in
9.1
ms
The
Mechanics
of
Shellcode
: A Blueprint for Exploitation
🚩
CTF
medium.com
·
3d
Anthropic
Mythos
, Security Program Politics, Vulnerability Research is
Cooked
🔐
Infosec
tldrsec.com
·
13h
another memory
corruption
case
🚩
CTF
trofi.github.io
·
2d
·
Lobsters
,
Hacker News
VU#536588: Multiple Heap Buffer Overflows in
Orthanc
DICOM
Server
🔐
Infosec
kb.cert.org
·
13h
Claude Code found a Linux
vulnerability
hidden for 23 years
🔐
Infosec
blog.adafruit.com
·
2d
On LLMs and
Vulnerability
Research
🔐
Infosec
devansh.bearblog.dev
·
3d
DebugHarness
:
Emulating
Human Dynamic Debugging for Autonomous Program Repair
🚩
CTF
arxiv.org
·
3d
Vulnerability Research Isn’t
Cooked
; It’s
Burned
Beyond Recognition
🔐
Infosec
jericho.blog
·
3d
Vulnerability
Research Is
Cooked
🔐
Infosec
simonwillison.net
·
6d
Understanding
Buffer
Overflows
: From Fundamentals to Real-World Impact
🚩
CTF
medium.com
·
5d
Defending Buffer
Overflows
in WebAssembly: A
Transpiler
Approach
🛡️
Security Engineering
arxiv.org
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help