Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
edy4241's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83054
posts in
1.17
s
Loading...
Subscribe
What’s Up With All Those
Equals
Signs
Anyway
?
pxlnv.com
·
3d
⚡
fuzzing
Let This One Browser
Extension
Do Your
Hacking
For You!
infosecilluminati.medium.com
·
3d
🔧
hardware hacking
Accounts get
taken
over without "
hacks
", step by step
systemweakness.com
·
2d
·
Discuss:
Hacker News
🔧
hardware hacking
Executive Function as Code: using (
Doom
)
Emacs
to script my brain
milly.kittycloud.eu
·
1d
·
Discuss:
Hacker News
🔧
hardware hacking
Old
GitHub
Projects
themindpalace.bearblog.dev
·
2d
🔧
reverse engineering
How not to program in
Dyalog
APL
toolofthought.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
🔧
reverse engineering
FOSDEM
26 – My
Hallway
Track Takeaways
sluongng.substack.com
·
1d
·
Discuss:
Substack
🔧
reverse engineering
Spec-Logic
: AI-powered PC building assistant
dev.to
·
1d
·
Discuss:
DEV
🔧
hardware hacking
Op
Neusploit
: Russian
APT28
Uses Microsoft Office Flaw in Malware Attacks
hackread.com
·
3d
🔧
hardware hacking
What Can You Actually Do with Claude Code?
whytryai.com
·
1d
🔧
reverse engineering
Infrastructure Before Features: Building the Right Things First
dev.to
·
19h
·
Discuss:
DEV
🔧
reverse engineering
The
fastest
ways to find files from the
command-line
on Linux
howtogeek.com
·
1d
🔧
hardware hacking
surge-synthesizer/shortcircuit-xt
github.com
·
2d
🔧
hardware hacking
CySecurity News - Latest Information Security and Hacking Incidents:
Iconics
SCADA
Flaw Enables Privileged File Abuse and Windows DoS
cysecurity.news
·
2d
·
Discuss:
Blogger
🔧
hardware hacking
**Abstract:** This research presents a novel system for real-time
abandoned
object risk assessment in public
spaces
using computer vision and sensor fusion t...
freederia.com
·
1d
🔧
reverse engineering
Bypassing Prompt Injection Detectors through
Evasive
Injections
arxiv.org
·
4d
🔧
hardware hacking
**Abstract:** This paper introduces a novel framework for automated vulnerability discovery and
patching
of
neuromorphic
hardware, leveraging hyper-dimension...
freederia.com
·
2d
🔧
hardware hacking
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Reducing
the Costs of Proof Synthesis on Rust Systems by Scaling Up a
Seed
Training Set
arxiv.org
·
1d
🔧
reverse engineering
GKcodebase/API
_Architecture: API designs in
jaca
github.com
·
1d
·
Discuss:
DEV
🔧
reverse engineering
A
steep
discount pushes this
beastly
mini PC to a new level
xda-developers.com
·
2d
🔧
hardware hacking
Loading...
Loading more...
« Page 26
•
Page 28 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help