Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Binary Analysis, Disassemblers, Debuggers, Exploit Development
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122480
posts in
893.0
ms
The
Joystick-shaped
Screwdriver That Makes
Repairing/DIY
Projects Fun and Intuitive
yankodesign.com
·
16h
🎲
Game Design
650:
Korn
Chips
bsdnow.tv
·
1h
🚀
Performance
Fidelity
Research
CS-2
a go-go 🫣
twogoodears.blogspot.com
·
3h
·
Discuss:
Blogger
🚀
Performance
Zvec
: SQLite-like
simplicity
in an embedded vector database (By Alibaba)
zvec.org
·
3h
·
Discuss:
Hacker News
🔀
Parallel Computing
Safety
Recovery
in Reasoning Models Is Only a Few Early
Steering
Steps Away
arxiv.org
·
10h
🔀
Parallel Computing
Cross Compiling
CGO
with
Dagger
and Zig
johncodes.com
·
4h
·
Discuss:
Hacker News
🏗️
Build Systems
Scripting on the
JVM
with Java,
Scala
, and Kotlin
mill-build.org
·
5h
·
Discuss:
Hacker News
,
r/programming
⚙️
Compilers
Results from the
Advent
of
FPGA
Challenge
blog.janestreet.com
·
11h
·
Discuss:
Hacker News
🔀
Parallel Computing
The Hidden Risks in Modern
Applications
and How to
Protect
Against Them
theaisurf.com
·
1d
🚀
Performance
Fully Countering
Trusting
Trust through Diverse Double-Compiling (
DDC
) - Countering Trojan Horse attacks on Compilers
dwheeler.com
·
1d
🔀
Parallel Computing
JUXT
Blog: From
specification
to stress test: a weekend with Claude
juxt.pro
·
1d
·
Discuss:
Hacker News
🔀
Parallel Computing
GTIG
AI Threat Tracker: Distillation,
Experimentation
, and (Continued) Integration of AI for Adversarial Use
cloud.google.com
·
8h
🎮
Game Optimization
Building a Virtual
Ethical
Hacking Home Lab — Part 6: System
Exploitation
infosecwriteups.com
·
10h
🌐
Network Protocols
How I Used Claude Code to
Teach
Myself
Rust
mlolson.github.io
·
23h
·
Discuss:
Hacker News
,
r/programming
💻
Programming
How I Built an End-to-End Integration System Using
Dell
Boomi
dileepkancherla.dev
·
35m
·
Discuss:
DEV
📟
Embedded Systems
AI Code’s Logic Can Now Be
Checked
From Within,
Bypassing
External Tests
quantumzeitgeist.com
·
1d
⚙️
Compilers
[Paper] How does information access affect LLM
monitors
' ability to detect
sabotage
?
lesswrong.com
·
18h
🚀
Performance
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
2d
·
Discuss:
Hacker News
🚀
Performance
Links 12/02/2026: "Microsoft Just
Forked
Windows" and Windows
Notepad
is a Giant Security Hole
techrights.org
·
5h
🌐
Network Protocols
Verified
developer
portfolios
using Code Complexity and AI
dev-proof-portfolio.vercel.app
·
18h
·
Discuss:
Hacker News
🚀
Performance
Loading...
Loading more...
« Page 3
•
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help