Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
edy4241's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82262
posts in
357.3
ms
Loading...
Subscribe
What are
tokens
and how to
count
them?
help.openai.com
·
2d
·
Discuss:
Hacker News
🔧
reverse engineering
Brandon
Dail
brandondail.com
·
3d
🔧
reverse engineering
WebGPU
Cameras
webgpufundamentals.org
·
4d
🔧
reverse engineering
SNAP! System
Reference
Document
legacy.drivethrurpg.com
·
3d
⚡
fuzzing
You Know What? Just Don’t Split
Words
into
Letters
adrianroselli.com
·
3d
⚡
fuzzing
New AMD docs show its next-gen Zen 6 CPUs will adopt Intel's '
FRED
'
interrupt
handling and could point to a major architectural overhaul
pcgamer.com
·
4d
🔧
hardware hacking
Mechanistic
Interpretability:
Peeking
Inside an LLM
towardsdatascience.com
·
3d
⚡
fuzzing
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Stop
Prompt
Engineering. Call AI by Code
Instead
.
dev.to
·
1d
·
Discuss:
DEV
🔧
reverse engineering
Debugging
the Technical Debt of
Everyday
Living
dev.to
·
1d
·
Discuss:
DEV
🔧
reverse engineering
Industrial Design Discipline: The Yard Sale
P1
Resort
Poles
abduzeedo.com
·
3d
🔧
reverse engineering
Helping Claude Code to find
undocumented
APIs
from the code
flaky.build
·
5d
🔧
reverse engineering
How not to program in
Dyalog
APL
toolofthought.com
·
4d
·
Discuss:
Lobsters
,
Hacker News
🔧
reverse engineering
Malicious Script Delivering More
Maliciousness
, (
Wed
, Feb 4th)
isc.sans.edu
·
4d
🔧
hardware hacking
"Five-Point
Haskell
": Total
Depravity
(and Defensive Typing)
blog.jle.im
·
6d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🔧
reverse engineering
The
Birthmark
Standard: Privacy-Preserving Photo Authentication via Hardware Roots of Trust and
Consortium
Blockchain
arxiv.org
·
2d
🔧
hardware hacking
BleepingComputer
: Microsoft rolls out native
Sysmon
monitoring in Windows 11
bleepingcomputer.com
·
3d
🔧
hardware hacking
CoLT
: Reasoning with Chain of
Latent
Tool Calls
arxiv.org
·
3d
🔧
reverse engineering
Op
Neusploit
: Russian
APT28
Uses Microsoft Office Flaw in Malware Attacks
hackread.com
·
5d
🔧
hardware hacking
Valve
Confirms Our Worst
Fear
For The Steam Machine
bgr.com
·
2d
🔧
hardware hacking
I
switched
from Arch to something
boring
, but I still want to switch back
xda-developers.com
·
3d
🔧
reverse engineering
Loading...
Loading more...
« Page 44
•
Page 46 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help