Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Disassembly, Decompilation, Software Analysis, IDA Pro
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
122834
posts in
33.6
ms
Understanding Evil: How to
Reverse
Engineer
Malware
🦠
Malware Analysis
huntress.com
·
3d
·
…
Reverse engineering the secrets of an
RA-02
LoRa
module
💾
Retro Computing
blog.adafruit.com
·
2d
·
…
No More Code Reviews:
Lights-Out
Codebases
Ahead
🏗️
Cranelift
molochinations.substack.com
·
23h
·
Substack
·
…
CADReasoner
:
Iterative
Program Editing for CAD Reverse Engineering
⚡
Ruff
arxiv.org
·
1d
·
…
In-Depth Analysis of 187 Publications on Hardware Reverse Engineering (
Ruhr
U.,
MPI
)
🔌
FPGA Programming
semiengineering.com
·
5d
·
…
BSidesSF
2026:
rugdoctor
- a broken JIT compiler pwn challenge
🔓
Binary Exploitation
skullsecurity.org
·
2d
·
…
How Meta
Turned
Debugging
Into a Product
🔭
Tracing
blog.bytebytego.com
·
1d
·
…
Effective
Debugging
📚
Stack Unwinding
simplerengineeringmanagement.substack.com
·
4d
·
Substack
·
…
The Pain of
Neglecting
Maintainability
in Code
🛡️
Error Handling
dev.to
·
2d
·
DEV
·
…
Reverse Engineering
Crazy
Taxi
, Part 2
💾
Retro Computing
wretched.computer
·
2d
·
Hacker News
·
…
Shell
Field
Guide
🐚
Shell Scripting
raimonster.com
·
6d
·
…
IDA
Plugin
Updates on 2026-03-31
🪟
Smithay
williballenthin.com
·
2d
·
…
I Was Hand-Writing Every AI Tool. Then I
Discovered
MCP
Servers
.
🏗️
Cranelift
instagram.com
·
5d
·
DEV
·
…
AI is Open Source’s Big Moment. Is it Ready?
💾
Retro Computing
fossforce.com
·
2d
·
…
Container Transforms: Working with
Nested
Binary
Formats
📦
Binary Formats
binary.ninja
·
1d
·
…
What software engineering got wrong for decades, you're about to
repeat
with AI
⚓
Anchors
lobsterpack.com
·
3d
·
Hacker News
·
…
Mad Bugs:
Vim
vs.
Emacs
vs. Claude
📝
Neovim
blog.calif.io
·
2d
·
Lobsters
,
Hacker News
,
Hacker News
·
…
Malware Under The
Microscope
:
Manual
Analysis
🦠
Malware Analysis
huntress.com
·
3d
·
…
Superset
Decompilation
🏭
Code Generation
arxiv.org
·
2d
·
…
Vision-Based Robotic
Disassembly
Combined with Real-Time
MFA
Data Acquisition
🤖
Robotics
arxiv.org
·
2d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help