Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
edy4241's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81081
posts in
696.7
ms
Loading...
Subscribe
Let This One Browser
Extension
Do Your
Hacking
For You!
infosecilluminati.medium.com
·
4d
🔧
hardware hacking
Dumping
Nintendo e‑Reader Card “
ROMs
”
sethmlarson.dev
·
5d
🔧
reverse engineering
First Images Of
GKD
350H
Ultra Leaked
retrododo.com
·
3d
🔧
hardware hacking
openSUSE
:
Kernel
git
en.opensuse.org
·
3d
🔧
hardware hacking
Finding the needle in the
logstack
: Reducing LLM context with
TF-IDF
eliseomartelli.it
·
3d
🔧
reverse engineering
ARY
: Always
Repeat
Yourself
dolphinmade.com
·
4d
·
Discuss:
Hacker News
⚡
fuzzing
Old
GitHub
Projects
themindpalace.bearblog.dev
·
4d
🔧
reverse engineering
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Surgery for quantum bits: Bit-flip errors
corrected
during
superconducting
qubit operations
phys.org
·
3d
🔧
hardware hacking
Training language models on
TPUs
shouldn't be
scary
dogac.dev
·
3d
·
Discuss:
Hacker News
🔧
hardware hacking
Running Local LLMs as Your AI Coding
Assistant
on Apple
Silicon
dev.to
·
2d
·
Discuss:
DEV
🔧
reverse engineering
The Zen of the
Bronze
Layer: Embracing
Schema
Chaos
dev.to
·
3d
·
Discuss:
DEV
🔧
reverse engineering
WebAccessVL
: Making an Accessible Web via Violation-Conditioned
VLM
arxiv.org
·
4d
🔧
reverse engineering
Fanttik
’s compact electric
screwdriver
kit with charging dock drops to $45 (Reg. $60)
9to5toys.com
·
3d
🔧
hardware hacking
Claude Code Part 12: How I Use Claude Code for
Empirical
Research
causalinf.substack.com
·
4d
·
Discuss:
Substack
🔧
reverse engineering
CySecurity News - Latest Information Security and Hacking Incidents:
Iconics
SCADA
Flaw Enables Privileged File Abuse and Windows DoS
cysecurity.news
·
4d
·
Discuss:
Blogger
🔧
hardware hacking
Bypassing Prompt Injection Detectors through
Evasive
Injections
arxiv.org
·
6d
🔧
hardware hacking
bmad-code-org/BMAD-METHOD
v6.0.0-Beta.7
github.com
·
4d
🔧
reverse engineering
surge-synthesizer/shortcircuit-xt
github.com
·
4d
🔧
hardware hacking
Stop Using
Icons
in Data
Tables
medium.com
·
3d
·
Discuss:
Hacker News
🔧
reverse engineering
The
Chrysalis
Backdoor: A Deep Dive into Lotus
Blossom
’s toolkit
rapid7.com
·
6d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔧
hardware hacking
« Page 49
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help