Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Binary Analysis, Disassemblers, Debuggers, Exploit Development
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122715
posts in
727.5
ms
Reverse
cicd
with GitHub and self hosted
Forgejo
gist.github.com
·
21h
·
Discuss:
Hacker News
,
r/devops
🏗️
Build Systems
New “
eBPF
In Production” Report Showcases Production Enterprise Outcomes Across Networking, Security, and
Observability
ebpf.foundation
·
8h
📟
Embedded Systems
Realtek
Level 2
Protocol
bruceediger.com
·
23h
🌐
Network Protocols
Garnix
Blog:
Forwardly-evaluated
build systems
garnix.io
·
1d
·
Discuss:
Lobsters
,
Hacker News
🚀
Performance
OpenEnv
in Practice:
Evaluating
Tool-Using Agents in Real-World Environments
huggingface.co
·
16h
🌐
Network Protocols
Reverse Engineering the
Prom
for the
SGI
O2
mattst88.com
·
3d
·
Discuss:
Lobsters
,
Hacker News
⚡
Performance Optimization
Unveiling
Bagel
: Why Your Developer's Laptop is the
Softest
Target in Your Supply Chain
boostsecurity.io
·
22h
🔧
Systems Programming
20 Claude Code agents, one terminal: a
tmux
+
AppleScript
setup
pkarnal.com
·
14h
·
Discuss:
Hacker News
🔀
Parallel Computing
Over at
Tux
Machines
...
techrights.org
·
10h
📟
Embedded Systems
Why I Started Building My Own
Containers
(and What I Wish
Tutorials
Told Me)
hackernoon.com
·
11h
🏗️
Build Systems
Notepad-Plus
Fuss
:
Notepad
++ Supply Chain Attack Analysis
levelblue.com
·
1d
🌐
Network Protocols
Release
v2026.2.10
:
Shims
, Stdin, and Smarter Offline
github.com
·
12h
🌐
Network Protocols
How To
Hack
Part 3
infosecwriteups.com
·
1d
💻
Programming
KeyleSSH
: A New PAM Concept for IT
Admins
dev.to
·
14h
·
Discuss:
DEV
🌐
Network Protocols
GoodVibe
:
Security-by-Vibe
for LLM-Based Code Generation
arxiv.org
·
11h
⚙️
Compilers
Comparing
1c9ec69115
..
.16d56967b7
github.com
·
2h
💻
Programming
Hacking
the last
Z80
computer ever made
blog.adafruit.com
·
41m
📟
Embedded Systems
AI-Assisted Web and Cloud Penetration Testing with Cursor + MCP
HexStrike
and
Burp
Suite MCP.
infosecwriteups.com
·
10h
🚀
Performance
Discovering
High Level Patterns from Simulation
Traces
arxiv.org
·
1d
🔀
Parallel Computing
AI Code Review Is Great at
Nitpicks
,
Terrible
at Systems
hackernoon.com
·
11h
🚀
Performance
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help