Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Binary Analysis
Reverse Engineering, Disassemblers, Hex Editors, Debugging Symbols
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187383
posts in
81.9
ms
Reverse
Engineering & Hardware
Hacking
🔓
Hacking
malware.news
·
5h
Teardown of
AlphaFold
codebase
with a AST-free LLM-free static analysis engine
🕯️
Candle
squid-protocol.github.io
·
3d
·
Hacker News
Reverse
Engineering
SimTower
🪄
Prompt Engineering
phulin.me
·
1d
·
Hacker News
,
r/programming
I've just released version 1.1.1 of the
Checkstyle
Extension for
bld
🎨
Design Tokens
github.com
·
4h
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
💻
Coding Agents
arxiv.org
·
2d
ERP
for
Remanufacturing
: Scale with Microsoft Dynamics
📦
Binary Packaging
erpsoftwareblog.com
·
3d
Reverse Engineering With AI
Unearths
High-Severity
GitHub Bug (4 minute read)
🔓
Hacking
darkreading.com
·
1d
IDA
Plugin
Updates on 2026-04-29
🦀
Rust
williballenthin.com
·
2d
How I Broke the Anti-Bot Behind
Nike
, Kick, and
Twitch
🕳
LLM Vulnerabilities
emro.cat
·
3d
·
Lobsters
,
Hacker News
Static Analysis Results
Interchange
Format (
SARIF
)
💾
Binary Formats
sarif.info
·
2d
Programs
are
meant
to be read by humans
🪄
Prompt Engineering
metafilter.com
·
4d
Reverse
Engineering
Stunt
Island with LLM
🚀
Astral
marnetto.net
·
3d
·
Hacker News
banteg/bn
: binary ninja cli for coding agents
🔧
Developer tools
github.com
·
6d
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
🛡️
AI Security
arxiv.org
·
2d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🛡️
AI Security
arxiv.org
·
2d
Mono2Sls
: Automated
Monolith-to-Serverless
Migration via Multi-Stage Pipeline with Static Analysis
☁️
Cloudflare D1
arxiv.org
·
2d
Hybrid
Path-Sums
for Hybrid Quantum
Programs
🧮
SMT Solvers
arxiv.org
·
2d
Adversarial Malware Generation in Linux ELF
Binaries
via Semantic-Preserving
Transformations
🛡️
AI Security
arxiv.org
·
3d
CrossCommitVuln-Bench
: A Dataset of
Multi-Commit
Python Vulnerabilities Invisible to
Per-Commit
Static Analysis
🔒
Borrow Checker
arxiv.org
·
6d
Less Is More: Measuring How LLM
Involvement
affects
Chatbot Accuracy in Static Analysis
🦙
Ollama
arxiv.org
·
6d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help