Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
edy4241's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82419
posts in
494.6
ms
Loading...
Subscribe
What are
tokens
and how to
count
them?
help.openai.com
·
2d
·
Discuss:
Hacker News
🔧
reverse engineering
WebGPU
Cameras
webgpufundamentals.org
·
4d
🔧
reverse engineering
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Accounts get
taken
over without "
hacks
", step by step
systemweakness.com
·
3d
·
Discuss:
Hacker News
🔧
hardware hacking
You Know What? Just Don’t Split
Words
into
Letters
adrianroselli.com
·
2d
⚡
fuzzing
Old
GitHub
Projects
themindpalace.bearblog.dev
·
3d
🔧
reverse engineering
Mechanistic
Interpretability:
Peeking
Inside an LLM
towardsdatascience.com
·
3d
⚡
fuzzing
Industrial Design Discipline: The Yard Sale
P1
Resort
Poles
abduzeedo.com
·
3d
🔧
reverse engineering
How not to program in
Dyalog
APL
toolofthought.com
·
4d
·
Discuss:
Lobsters
,
Hacker News
🔧
reverse engineering
Helping Claude Code to find
undocumented
APIs
from the code
flaky.build
·
5d
🔧
reverse engineering
Steal
my code: I built a
RAG
agent for sales people
dev.to
·
2d
·
Discuss:
DEV
🔧
reverse engineering
Mastering Legacy Code:
Bypassing
Gated
Content with Python
dev.to
·
3d
·
Discuss:
DEV
🔧
reverse engineering
Malicious Script Delivering More
Maliciousness
, (
Wed
, Feb 4th)
isc.sans.edu
·
4d
🔧
hardware hacking
"Five-Point
Haskell
": Total
Depravity
(and Defensive Typing)
blog.jle.im
·
6d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🔧
reverse engineering
Op
Neusploit
: Russian
APT28
Uses Microsoft Office Flaw in Malware Attacks
hackread.com
·
4d
🔧
hardware hacking
The
Birthmark
Standard: Privacy-Preserving Photo Authentication via Hardware Roots of Trust and
Consortium
Blockchain
arxiv.org
·
2d
🔧
hardware hacking
CoLT
: Reasoning with Chain of
Latent
Tool Calls
arxiv.org
·
3d
🔧
reverse engineering
What Can You Actually Do with Claude Code?
whytryai.com
·
3d
🔧
reverse engineering
**Abstract:** This paper introduces a novel framework for automated vulnerability discovery and
patching
of
neuromorphic
hardware, leveraging hyper-dimension...
freederia.com
·
3d
🔧
hardware hacking
A
steep
discount pushes this
beastly
mini PC to a new level
xda-developers.com
·
3d
🔧
hardware hacking
Valve
Confirms Our Worst
Fear
For The Steam Machine
bgr.com
·
2d
🔧
hardware hacking
Loading...
Loading more...
« Page 43
•
Page 45 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help