Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
edy4241's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83075
posts in
758.7
ms
Loading...
Subscribe
What’s Up With All Those
Equals
Signs
Anyway
?
pxlnv.com
·
4d
⚡
fuzzing
What are
tokens
and how to
count
them?
help.openai.com
·
2d
·
Discuss:
Hacker News
🔧
reverse engineering
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Let This One Browser
Extension
Do Your
Hacking
For You!
infosecilluminati.medium.com
·
3d
🔧
hardware hacking
Executive Function as Code: using (
Doom
)
Emacs
to script my brain
milly.kittycloud.eu
·
2d
·
Discuss:
Hacker News
🔧
hardware hacking
Old
GitHub
Projects
themindpalace.bearblog.dev
·
3d
🔧
reverse engineering
FOSDEM
26 – My
Hallway
Track Takeaways
sluongng.substack.com
·
2d
·
Discuss:
Substack
🔧
reverse engineering
"Five-Point
Haskell
": Total
Depravity
(and Defensive Typing)
blog.jle.im
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🔧
reverse engineering
Op
Neusploit
: Russian
APT28
Uses Microsoft Office Flaw in Malware Attacks
hackread.com
·
4d
🔧
hardware hacking
The
fastest
ways to find files from the
command-line
on Linux
howtogeek.com
·
2d
🔧
hardware hacking
surge-synthesizer/shortcircuit-xt
github.com
·
3d
🔧
hardware hacking
After the
Compiler
Writes
Itself: The Human Skills That Still Matter
dev.to
·
1d
·
Discuss:
DEV
🔧
reverse engineering
**Python
Techniques
for Complete Machine Learning Model
Lifecycle
Management**
dev.to
·
1d
·
Discuss:
DEV
🔧
reverse engineering
**Abstract:** This research presents a novel system for real-time
abandoned
object risk assessment in public
spaces
using computer vision and sensor fusion t...
freederia.com
·
2d
🔧
reverse engineering
Localizing
multipartite
entanglement with local and global measurements
arxiv.org
·
1d
⚡
fuzzing
Bypassing Prompt Injection Detectors through
Evasive
Injections
arxiv.org
·
4d
🔧
hardware hacking
**Abstract:** This paper introduces a novel framework for automated vulnerability discovery and
patching
of
neuromorphic
hardware, leveraging hyper-dimension...
freederia.com
·
2d
🔧
hardware hacking
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csa) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
·
2d
·
Discuss:
Hacker News
🔧
hardware hacking
A
steep
discount pushes this
beastly
mini PC to a new level
xda-developers.com
·
3d
🔧
hardware hacking
The
Chrysalis
Backdoor: A Deep Dive into Lotus
Blossom
’s toolkit
rapid7.com
·
5d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔧
hardware hacking
I
switched
from Arch to something
boring
, but I still want to switch back
xda-developers.com
·
2d
🔧
reverse engineering
Loading...
Loading more...
« Page 38
•
Page 40 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help