Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Binary Analysis, Disassembly, Threat Research, RE
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
103303
posts in
767.1
ms
Tracking Malware Campaigns With
Reused
Material, (
Wed
, Feb 18th)
isc.sans.edu
·
2d
💥
Binary Exploitation
Looking for
vulnerabilities
is the last thing I do
neilmadden.blog
·
16h
·
Discuss:
Lobsters
💥
Binary Exploitation
Who
fixes
the zero-days AI finds in
abandoned
software?
dev.to
·
9h
·
Discuss:
DEV
💥
Binary Exploitation
Vulnerability
REsearch using
VulHunt
binarly.io
·
8h
💥
Binary Exploitation
macOS Malware Analysis: Music Plugin
DMG
Loader
the-sequence.com
·
1d
💥
Binary Exploitation
Building a
Custom
Architecture
and Platform: Part 1
binary.ninja
·
12h
🔬
Reverse engineering
A Unified Evaluation of Learning-Based
Similarity
Techniques
for Malware Detection
arxiv.org
·
2d
💥
Binary Exploitation
Hard drive
failure
analysis
blog.adafruit.com
·
3d
🔬
Reverse engineering
Statistical Analysis with Python For
Dummies
(
Wiley
)
i-programmer.info
·
9h
💥
Binary Exploitation
We hid
backdoors
in
binaries
— Opus 4.6 found 49% of them
dev.to
·
1d
·
Discuss:
DEV
💥
Binary Exploitation
'Counter terrorism' investigation launched into
attempted
power
substation
attack
abcnews.com
·
6h
🚩
CTF
Data
Collection
theprogrammersparadox.blogspot.com
·
1d
·
Discuss:
theprogrammersparadox.blogspot.com
🔨
DIY
Exploring the Utility of
MALDI-TOF
Mass Spectrometry and Antimicrobial Resistance in Hospital Outbreak Detection
arxiv.org
·
22h
💥
Binary Exploitation
Professional
Bitcoin Asset
Tracing
news.ycombinator.com
·
15h
·
Discuss:
Hacker News
🔐
Cryptography
TryHackMe-
Searchlight
IMINT
medium.com
·
9h
🚩
CTF
Who's
watching
who? Experts reveal
criminals
using fake enterprise software to gain access to company systems
techradar.com
·
15h
🚩
CTF
Stop
Throwing
Exceptions
. Use Option and Result Instead.
github.com
·
15h
·
Discuss:
DEV
🔨
DIY
How I Built an AI System That
Automates
Security Risk
Assessment
(And Why Your Security Team Needs…
infosecwriteups.com
·
23h
🚩
CTF
AI
Log
Analyzers
trendhunter.com
·
16h
💥
Binary Exploitation
Hodoscope
: Visualization for Efficient Human
Supervision
lesswrong.com
·
3h
🚩
CTF
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help