๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ฌ Binary Analysis

Disassembly, Hex Editors, Structure Recovery, Reverse Engineering

1Password subscriptions are on sale for 50 percent off right now
engadget.comยท35m
๐Ÿ”“Password Cracking
Building software teams that manage mistakes rather than rejecting them
testdouble.comยท2d
๐Ÿ”„Reproducible Builds
Getting Into Flow State with Agentic Coding
kau.shยท3d
โšกProof Automation
How to Make a Font That Says Nothing
untested.sonnet.ioยท2dยท
Discuss: Lobsters, Hacker News, Hacker News
๐Ÿ“ŸTerminal Typography
Leveraging AI Multi-Agent Systems in Financial Analysis
cacm.acm.orgยท1d
๐ŸงฎZ3 Applications
Three Decades of OpenWindows (2024)
vcojot.blogspot.comยท3dยท
Discuss: Hacker News
๐Ÿ Homelab Archaeology
Synthetic Auth Report โ€“ Issue 003
syntheticauth.aiยท3dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
When to use model distillation in production
inference.netยท1dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Testing an Event Ingestion Service: A Deep Dive into Our Approach
blog.scottlogic.comยท2dยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
FBI urges users to beware worrying Interlock ransomware attacks
techradar.comยท2d
๐Ÿ”“Hacking
Incompetence as a Virtue
dev.toยท18hยท
Discuss: DEV
๐Ÿ—บ๏ธCompetency Maps
ACID Operation in Backend Engineering: Building Data Integrity Like a Pro
dev.toยท2dยท
Discuss: DEV
๐ŸงฌPostgreSQL Forensics
Hacker inserts destructive code in Amazon Q as update goes live
csoonline.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
The Human-AI Interface: Designing Developer Workflows for Collaborative Intelligence (Post-Migration)
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
New method decodes the hidden origins of magnetism
phys.orgยท1d
๐ŸงฒMagnetic Domains
FastSmoothSAM: A Fast Smooth Method For Segment Anything Model
arxiv.orgยท4d
๐Ÿ“Projective Geometry
Court Battles Spark an Unexpected AI Movement: Fairness by Design
hackernoon.comยท2d
๐ŸŒŠStream Processing
Evaluating the Performance of AI Text Detectors, Few-Shot and Chain-of-Thought Prompting Using DeepSeek Generated Text
arxiv.orgยท1d
โš™๏ธCompression Benchmarking
Peeking Inside MinIO: How This Object Storage Powerhouse Works
dev.toยท19hยท
Discuss: DEV
๐Ÿ”„Sync Engine
DCFFSNet: Deep Connectivity Feature Fusion Separation Network for Medical Image Segmentation
arxiv.orgยท1d
๐ŸŒ€Hyperbolic Geometry
Loading...Loading more...
AboutBlogChangelogRoadmap