Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
馃敩 Reverse Engineering
Binary Analysis, Disassembly, Debugging, Software Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
111668
posts in
318.5
ms
We Replaced Our Bash Scripts and
Hydra
With a Single Go Binary for
Credential
Testing
dev.to
路
56m
路
Discuss:
DEV
馃惂
Linux
Computer
Forensic
Tools Comparison
Chart
2026
cybertriage.com
路
1d
馃
Malware Analysis
Building
Reliable
Software:
Planning
for Things to Break
saleor.io
路
1h
路
Discuss:
DEV
馃П
Firewalls
Stop
paying
for data
recovery
鈥攖hese 3 free tools actually work
makeuseof.com
路
1h
馃
Wireshark
When
auditing
any software system, it鈥檚
important
to...
lmika.org
路
19h
馃幆
Penetration Testing
BinaryAudit
: Can AI find
backdoors
in raw machine code?
quesma.com
路
2h
路
Discuss:
Hacker News
馃
Malware Analysis
Verifiable
Provenance
of Software Artifacts with Zero-Knowledge Compilation
arxiv.org
路
12h
馃
Malware Analysis
REPL-Driven
Development Is Back (
Thanks
to AI)
llbbl.blog
路
1h
馃悕
Python
Application
Security
dev.to
路
6h
路
Discuss:
DEV
馃攼
Cybersecurity
Projects
drehmflight.com
路
1h
馃捇
Computer Science
Design Decision:
Technical
Debt in
BillaBear
iain.rocks
路
5h
路
Discuss:
Hacker News
,
r/programming
馃惓
Docker
A
Conceptual
Framework for Exploration
Hacking
lesswrong.com
路
1d
馃幆
Penetration Testing
An offline
crossplatform
desktop app for cleaning dev
caches
reclaimr.dev
路
3h
路
Discuss:
Hacker News
馃惓
Docker
Refloow/Refloow-Geo-Forensics
: 鉂わ笍 Free batch image geolocation and digital forensics tool. Automatically extract .jpg
EXIF
data, visualize GPS coordinates on maps, and reconstruct event timelines for OSINT.
github.com
路
1h
路
Discuss:
Hacker News
馃
Wireshark
Teensy
Stereo Audio
Recorder
hackster.io
路
20h
馃惂
Linux
Craftsmanship
coding and the five
stages
of grief
thomasvilhena.com
路
2h
路
Discuss:
Hacker News
馃悕
Python
How I
Perform
Recon
on Modern Web Applications!
medium.com
路
5h
馃
Malware Analysis
learning by
reverse
engineering
clymup.com
路
6d
馃
Malware Analysis
Prolok
MS-DOS
floppy
copy protection reverse engineering
blog.adafruit.com
路
2d
馃
Malware Analysis
How a Small
OSINT
Team Turned the Epstein Files Dump Into
Actionable
Intelligence
hackernoon.com
路
12h
馃攼
Cybersecurity
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help