Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Binary Analysis, Disassembly, Threat Research, RE
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
5331
posts in
14.4
ms
CyberDefenders
—
WebStrike
Lab (PCAP Forensics)
medium.com
·
1d
🔍
Digital Forensics
MALUS
—
Clean
Room as a Service
simonwillison.net
·
4h
🧠
Context Engineering
DEW
#148 - Detection Pipeline Maturity,
GenUI
for Log Analysis and Hunting Kali in Splunk
detectionengineering.net
·
1d
🔐
InfoSec
The A to Z of
BSD
rubenerd.com
·
3h
🐧
Linux
Turning a
GDB
Coredump
Debug Session Into a Murder Mystery
hackaday.com
·
2d
🔧
Reverse Engineering
shopware
database
inspector
swdb.dev
·
14h
🔧
Reverse Engineering
We caught a threat actor
stealing
victim
data…
threadreaderapp.com
·
1d
🔐
InfoSec
Understanding
Cybersecurity
in the Digital Age
medium.com
·
1d
🔐
Cybersecurity
Take a Ride on
wrongbaud
’s Hardware
Hacking
Highway
hackaday.com
·
3d
🔧
Reverse Engineering
alienator88/Pearcleaner
: A free, source-available and fair-code licensed mac app cleaner
github.com
·
14h
💻
Terminal Tools
FogAI
Part 3: The Knowledge Extraction Layer (Why Using an LLM for NER is Architectural
Malpractice
)
hackernoon.com
·
1d
💬
NLP
Less-relevant results
How I Test an AI Support Agent: A
Practical
Testing
Pyramid
pub.towardsai.net
·
21h
✍️
Prompt Engineering
Coding After
Coders
: The End of Computer
Programming
as We Know It
simonwillison.net
·
5h
⚡
Code Generation
Iran-Backed Hackers Claim
Wiper
Attack on Medtech Firm
Stryker
krebsonsecurity.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔐
Cybersecurity
Part 4: Data
Manipulation
in Data
Cleaning
pub.towardsai.net
·
2d
🛡️
Privacy Engineering
WA estate tax: Lawmakers roll back rate increase,
fearing
wealth
exodus
news.google.com
·
1h
⚖️
AI Governance
How Childhood Trauma
Shapes
Dissociative
Identity Disorder
psychologytoday.com
·
2h
🔬
Cognitive Science
Feature
Flagging
at
Databricks
benjamincongdon.me
·
11h
📈
Developer Productivity
Duty-Free Bits:
Projectivizing
Garbling
Schemes
eprint.iacr.org
·
5d
🔢
Homomorphic Encryption
Reviewing
ENISA
’s Package Manager Advisory
nesbitt.io
·
14h
🔐
InfoSec
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help