Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
edy4241's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83062
posts in
885.6
ms
Loading...
Subscribe
What’s Up With All Those
Equals
Signs
Anyway
?
pxlnv.com
·
3d
⚡
fuzzing
What are
tokens
and how to
count
them?
help.openai.com
·
1d
·
Discuss:
Hacker News
🔧
reverse engineering
Let This One Browser
Extension
Do Your
Hacking
For You!
infosecilluminati.medium.com
·
3d
🔧
hardware hacking
Executive Function as Code: using (
Doom
)
Emacs
to script my brain
milly.kittycloud.eu
·
1d
·
Discuss:
Hacker News
🔧
hardware hacking
Old
GitHub
Projects
themindpalace.bearblog.dev
·
2d
🔧
reverse engineering
FOSDEM
26 – My
Hallway
Track Takeaways
sluongng.substack.com
·
1d
·
Discuss:
Substack
🔧
reverse engineering
Spec-Logic
: AI-powered PC building assistant
dev.to
·
1d
·
Discuss:
DEV
🔧
hardware hacking
"Five-Point
Haskell
": Total
Depravity
(and Defensive Typing)
blog.jle.im
·
4d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🔧
reverse engineering
Op
Neusploit
: Russian
APT28
Uses Microsoft Office Flaw in Malware Attacks
hackread.com
·
3d
🔧
hardware hacking
Infrastructure Before Features: Building the Right Things First
dev.to
·
19h
·
Discuss:
DEV
🔧
reverse engineering
The
fastest
ways to find files from the
command-line
on Linux
howtogeek.com
·
1d
🔧
hardware hacking
CySecurity News - Latest Information Security and Hacking Incidents:
Iconics
SCADA
Flaw Enables Privileged File Abuse and Windows DoS
cysecurity.news
·
2d
·
Discuss:
Blogger
🔧
hardware hacking
**Abstract:** This research presents a novel system for real-time
abandoned
object risk assessment in public
spaces
using computer vision and sensor fusion t...
freederia.com
·
1d
🔧
reverse engineering
Bypassing Prompt Injection Detectors through
Evasive
Injections
arxiv.org
·
4d
🔧
hardware hacking
**Abstract:** This paper introduces a novel framework for automated vulnerability discovery and
patching
of
neuromorphic
hardware, leveraging hyper-dimension...
freederia.com
·
2d
🔧
hardware hacking
Reducing
the Costs of Proof Synthesis on Rust Systems by Scaling Up a
Seed
Training Set
arxiv.org
·
1d
🔧
reverse engineering
GKcodebase/API
_Architecture: API designs in
jaca
github.com
·
1d
·
Discuss:
DEV
🔧
reverse engineering
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
A
steep
discount pushes this
beastly
mini PC to a new level
xda-developers.com
·
2d
🔧
hardware hacking
The
Chrysalis
Backdoor: A Deep Dive into Lotus
Blossom
’s toolkit
rapid7.com
·
4d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔧
hardware hacking
I
switched
from Arch to something
boring
, but I still want to switch back
xda-developers.com
·
1d
🔧
reverse engineering
Loading...
Loading more...
« Page 26
•
Page 28 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help