Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
💾 Binary Analysis
binary exploitation, ELF, PE format, angr, binary ninja
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186693
posts in
64.1
ms
Cryptography
challenges @
KalmarCTF
2026
🌐
Protocol Fuzzing
blog.zksecurity.xyz
·
2d
·
Hacker News
std
::
regex
_search (3) Linux Manual Page
🔣
Type Systems
systutorials.com
·
19h
Algorithms
in
Java
Series
🌊
Dataflow Analysis
baeldung.com
·
1d
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
📜
Decompilation
arxiv.org
·
3d
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
📟
Firmware Analysis
github.com
·
13h
·
Hacker News
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🐧
Kernel Exploitation
arxiv.org
·
3d
Building
Semantic
Version Control in Rust
📜
Decompilation
therohansharma.com
·
5d
·
Hacker News
Reverse engineered
Alienware
16X Aurora fan control on Linux via
ACPI
— full independent CPU/GPU fan speed control working
🔌
Hardware Security
github.com
·
3d
·
r/archlinux
GoAT-X
: A Graph of
Auditing
Thoughts for Securing Token Transactions in Cross-Chain Contracts
⛓️
ROP Chains
arxiv.org
·
3d
std
::_Maybe_
unary
_or_binary_function (3) Linux Manual Page
📜
Decompilation
systutorials.com
·
1d
"
Parse
, don't
Validate
" through the years with C++
🔣
Type Systems
derekrodriguez.dev
·
4d
·
Hacker News
,
r/programming
You can beat the
binary
search
🌊
Dataflow Analysis
lemire.me
·
3d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/programming
AI
vibe
coding vs. AI
vibe
cracking
🔀
Concolic Execution
meshoskey.com
·
4d
·
Hacker News
Hexadecimal/Binary
Editor
📜
Decompilation
crumblingstatue.github.io
·
5d
Hybrid
Path-Sums
for Hybrid Quantum
Programs
🧮
Symbolic Execution
arxiv.org
·
3d
Mono2Sls
: Automated
Monolith-to-Serverless
Migration via Multi-Stage Pipeline with Static Analysis
🔣
Type Systems
arxiv.org
·
3d
Incisor
: Ex Ante Cloud Instance Selection for
HPC
Jobs
🛡️
Exploit Mitigations
arxiv.org
·
3d
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
📟
Firmware Analysis
arxiv.org
·
1d
krb5_verify_
checksum
_
iov
(3) Linux Manual Page
📟
Firmware Analysis
systutorials.com
·
6d
Cross-Lingual
Jailbreak Detection via Semantic
Codebooks
🧩
Intermediate Representation
arxiv.org
·
2d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help