Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Binary Analysis
Reverse Engineering, Disassemblers, Hex Editors, Debugging Symbols
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19796
posts in
845.7
ms
Show HN: Vector
Inspector
โ A
forensic
tool for vector databases
news.ycombinator.com
ยท
2d
ยท
Discuss:
Hacker News
๐ฏ
Qdrant
SHOW HN:
Notepad
++ Vulnerability
Checker
github.com
ยท
11h
ยท
Discuss:
Hacker News
๐
Prompt Injection
Uncovering
Hidden
Inclusions
of Vulnerable Dependencies in Real-World Java Projects
arxiv.org
ยท
2d
๐ ๏ธ
Build Optimization
A86/A386
assembler and
D86/D386
debugger
eji.com
ยท
2d
๐ฆ
Binary Packaging
Logic
for
Programmers
New Release and Next Steps
buttondown.com
ยท
1h
๐ป
Programming languages
Col-E/Recaf
: The modern Java
bytecode
editor
github.com
ยท
4h
โ๏ธ
Code Editors
First Steps,
Lasting
Impact: Platform-Aware
Forensics
for the Next Generation of Analysts
arxiv.org
ยท
1d
๐พ
Persistence Strategies
New post
phonon.cc
ยท
1d
๐
Self-hosting
What is Data Engineering?
databricks.com
ยท
20h
๐๏ธ
Database Engines
I Am Not a
Functional
Programmer
blog.daniel-beskin.com
ยท
1h
ยท
Discuss:
r/programming
๐ช
Prompt Engineering
Helping Claude Code to find
undocumented
APIs
from the code
flaky.build
ยท
1d
๐
Claude Plugins
More Control, Less
Hassle
: Self-Serve Recovery with Point-in-Time
Restore
motherduck.com
ยท
15h
๐พ
Database Checkpointing
Coding Agents Need More Than
Examples
. They Need
Guardrails
.
medium.com
ยท
21h
ยท
Discuss:
Hacker News
๐ช
Prompt Engineering
A Black Box Made Less
Opaque
(part 2)
lesswrong.com
ยท
10h
๐ค
Tokenization
Building a Claude Code
skill
sevalla.com
ยท
4h
๐
Claude Plugins
Introduction
to SAFE
safe-docs.erlang-solutions.com
ยท
6h
๐ก๏ธ
System Reliability
Millets
: A practical memory-safety and thread-safety
experiment
eagledot.xyz
ยท
1d
ยท
Discuss:
Lobsters
,
Hacker News
๐
Linear Types
What Actually Breaks
ML
Models in Production: A
Fintech
Case Study
pub.towardsai.net
ยท
2h
๐๏ธ
LLM Infrastructure
The โฌ10
Mirror
: Why Enterprise Security Looks Like a
Kid
โs Toy
labs.itresit.es
ยท
7h
ยท
Discuss:
Hacker News
๐
Hardware Security
The
importance
of
artifacts
in AI-assisted programming
humanwhocodes.com
ยท
1d
๐จโ๐ป
Software development practices
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help