Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔬 Reverse Engineering
Binary Analysis, Disassembly, Debugging, Software Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112814
posts in
644.1
ms
Cupid-Commit
💘 - Finding the Code That Completes You
dev.to
·
5h
·
Discuss:
DEV
🐍
Python
Build in Public: My first Claude Code
Skill
dearagencyfounder.com
·
5h
🐍
Python
Joint optimization of maintenance and spare parts management in
upstream
–
downstream
systems under quality control
sciencedirect.com
·
21h
🛣️
BGP
A
Grounded
Theory of
Debugging
in Professional Software Engineering Practice
arxiv.org
·
1d
🦠
Malware Analysis
The Developer –>
Designer
Switch
c-daniele.github.io
·
15h
·
Discuss:
Hacker News
💻
Computer Science
ImportKit
vs
Flatfile
: The Best Affordable Alternative for Small Startups in 2026
dashboard.importkit.app
·
13h
·
Discuss:
DEV
🐍
Python
When Software
Drifts
, Build Your Own?
nabraj.com
·
18h
·
Discuss:
Hacker News
🦠
Malware Analysis
Linkdump
No 94
82mhz.net
·
1d
💻
Computer Science
Toolkit
Prep
trailofbits.github.io
·
2d
🐍
Python
How I
Perform
Recon
on Modern Web Applications!
medium.com
·
1d
🦠
Malware Analysis
How AI Code Review Tools Are
Catching
Bugs
That Humans Miss
thepulsegazette.com
·
12h
·
Discuss:
DEV
🦠
Malware Analysis
Davinci
Resolve
Studio
sourceforge.net
·
1d
·
Discuss:
r/archlinux
🐍
Python
R. S.
Doiel
, Software
Engineer/Analyst
rsdoiel.github.io
·
18h
🌐
DNS
4
systemd
tools that make everyday Linux
troubleshooting
much easier
howtogeek.com
·
20h
🐧
Linux
Endpoint
Inspector
: Precision Data Collection For The Real World
forensicfocus.com
·
1d
🦈
Wireshark
Teensy
Stereo Audio
Recorder
hackster.io
·
1d
🐧
Linux
Investigating
Windows
Registry
blog.elcomsoft.com
·
1d
🦠
Malware Analysis
The
Redundancy
Paradox
mihirdeshpande.com
·
1d
·
Discuss:
Hacker News
💻
Computer Science
Prolok
MS-DOS
floppy
copy protection reverse engineering
blog.adafruit.com
·
3d
🦠
Malware Analysis
How a Small
OSINT
Team Turned the Epstein Files Dump Into
Actionable
Intelligence
hackernoon.com
·
1d
🔐
Cybersecurity
Sign up or log in to see more results
Sign Up
Login
« Page 2
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help