Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82746
posts in
448.8
ms
Critlist/protoHack
: Restoring Jay Fenlason's original 1981โ1982 Hack to run on modern Linux.
github.com
ยท
12h
ยท
Discuss:
Hacker News
๐ง
Reverse Engineering
How I caught and
punished
my Substack
impersonator
๐ฅ
marketingideas.com
ยท
4h
๐ง
Reverse Engineering
Escape
The
Algorithm
kill-the-newsletter.com
ยท
1d
๐ง
Reverse Engineering
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
ยท
2d
๐ง
Reverse Engineering
HackTheBox
Sherlock
Brutus
Writeup
dev.to
ยท
3d
ยท
Discuss:
DEV
๐ง
Reverse Engineering
I Solved an
OhSint
TryHackMe
Challenge as a BeginnerโโโHereโs Everything I learned
medium.com
ยท
19h
๐ง
Reverse Engineering
Raw
or
typed
ziggit.dev
ยท
21h
๐ง
Reverse Engineering
Open
Molten
Claw
idiallo.com
ยท
1d
ยท
Discuss:
Hacker News
๐ง
Reverse Engineering
Liss
is More:
Passwords
are Dumb
caseyliss.com
ยท
13h
๐ง
Reverse Engineering
learning by
reverse
engineering
clymup.com
ยท
20h
๐ง
Reverse Engineering
Tip
of the Week #143: C++11
Deleted
Functions (<code>= delete</code>)
abseil.io
ยท
12h
๐ป
Programming
What I am doing now
artima.com
ยท
12h
๐ป
Programming
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
ยท
11h
๐ง
Reverse Engineering
ClawHavoc
: 341 Malicious
Clawed
Skills Found by the Bot They Were Targeting
koi.ai
ยท
2d
ยท
Discuss:
Hacker News
๐ง
Reverse Engineering
Poison
Fountain
go.dev
ยท
1d
ยท
Discuss:
r/golang
๐ง
Reverse Engineering
๐
Processing
11 million
rows
in minutes instead of hours
yellowduck.be
ยท
2h
๐ป
Programming
Full Disclosure: Certified
Asterisk
Security Release
certified-20.7-cert9
seclists.org
ยท
6h
๐ง
Linux
NEW GUIDE: Hacking
Yoto
Music Players #
AdafruitLearningSystem
@Adafruit
blog.adafruit.com
ยท
2d
๐ง
Reverse Engineering
Risky
Bulletin: Denmark
recruits
hackers for offensive cyber operations
news.risky.biz
ยท
2d
๐๏ธ
Software Architecture
The ultimate guide to NFL player
positions
โ
Offense
, defense and special teams explained
nytimes.com
ยท
2h
๐ป
Programming
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help