Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Binary Analysis
Reverse Engineering, Disassemblers, Hex Editors, Debugging Symbols
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
29401
posts in
65.0
ms
Bit-Vector
CHC
Solving for
Binary
Analysis and
Binary
Analysis for Bit-Vector
CHC
Solving
🗜️
Vector Compression
arxiv.org
·
2d
·
…
Building a
Firewall
...via
Endpoint
Security!?
🎯
Security Conference Talks
objective-see.org
·
6d
·
Hacker News
·
…
Reverse Engineering
Crazy
Taxi
, Part 2
📄
File Formats
wretched.computer
·
2d
·
Hacker News
·
…
Understanding Evil: How to
Reverse
Engineer
Malware
🦠
Malware Analysis
huntress.com
·
3d
·
…
Reverse
Engineering Claude Code's 2026 April
Fools
🔌
Claude Plugins
variety.is
·
2d
·
Hacker News
·
…
What's
cch
? Reverse Engineering Claude Code's Request
Signing
💉
Prompt Injection
a10k.co
·
1d
·
Hacker News
,
r/programming
·
…
I've just released version 1.5.0 of the
PMD
Extension for
bld
📦
Binary Packaging
github.com
·
5d
·
…
The
Webs
Digital
Locks
Have Never Had a Stronger Opponent
🕳
LLM Vulnerabilities
blog.pixelmelt.dev
·
2d
·
Hacker News
·
…
Chip Industry Technical Paper
Roundup
:
Mar
. 31
💻
Chips
semiengineering.com
·
1d
·
…
Bridging
Code Property
Graphs
and Language Models for Program Analysis
🕯️
Candle
arxiv.org
·
6d
·
…
CADReasoner
:
Iterative
Program Editing for CAD Reverse Engineering
🪄
Prompt Engineering
arxiv.org
·
1d
·
…
Finding Memory Leaks in C/C++ Programs via
Neuro-Symbolic
Augmented Static Analysis
🕯️
Candle
arxiv.org
·
2d
·
…
Disguising
Topology and Side-Channel Information through Covert Gate- and ML-Enabled IP
Camouflaging
🔐
Hardware Security
arxiv.org
·
3d
·
…
Superset
Decompilation
🧮
SMT Solvers
arxiv.org
·
2d
·
…
Evaluating Large and Lightweight Vision Models for
Irregular
Component Segmentation in E-Waste
Disassembly
📊
Vector Databases
arxiv.org
·
2d
·
…
ALPS
: Automated Least-Privilege Enforcement for Securing
Serverless
Functions
☁️
Serverless Databases
arxiv.org
·
6d
·
…
Automatic Identification of
Parallelizable
Loops
Using Transformer-Based Source Code Representations
🛠️
Build Optimization
arxiv.org
·
1d
·
…
Vision-Based Robotic
Disassembly
Combined with Real-Time
MFA
Data Acquisition
🔬
Chip Fabrication
arxiv.org
·
2d
·
…
Logging
Like Humans for LLMs: Rethinking
Logging
via Execution and
Runtime
Feedback
🪄
Prompt Engineering
arxiv.org
·
1d
·
…
DAInfer
+:
Neurosymbolic
Inference of API Specifications from Documentation via Embedding Models
🧠
LLM Inference
arxiv.org
·
2d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help