Feeds to Scour
SubscribedAll
Scoured 15546 posts in 124.1 ms
Dissecting Digital Viruses: My First Steps in Malware Analysis
dev.to·1d·
Discuss: DEV
🦠Malware Analysis
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·20h
📊Static Analysis
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·15h
🔍Audio Forensics
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.com·20h·
Discuss: Hacker News
🌐WARC Forensics
Preview
Report Post
IntelliSA: An Intelligent Static Analyzer for IaC Security Smell Detection Using Symbolic Rules and Neural Inference
arxiv.org·3h
📏Code Metrics
Preview
Report Post
Reverse Engineering Binary File Formats with AI
blog.kiney.de·4d·
Discuss: Hacker News
🔍Format Reverse Engineering
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.io·1d
🔬Binary Analysis
Preview
Report Post
CodeSOD: Validation Trimmed Away
thedailywtf.com·1d
Format Validation
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·18h
🕵️Penetration Testing
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.com·17h
🧪Archive Fuzzing
Preview
Report Post
🎢 Beginner-Friendly Guide 'Construct the Minimum Bitwise Array II' - LeetCode 3315 (C++, Python, JavaScript)
dev.to·1d·
Discuss: DEV
🔢Bitwise Algorithms
Preview
Report Post
On the Evidentiary Limits of Membership Inference for Copyright Auditing
arxiv.org·1d
🔍FLAC Forensics
Preview
Report Post
Dealing with alternatives
jemarch.net·1d
🔧Binary Parsing
Preview
Report Post
Repair and Reverse-Engineering of Nespresso Vertuo Next Coffee Machines
hackaday.com·11h
🔬Binary Analysis
Preview
Report Post
Welcome 0x1eef (Robert) to the HardenedBSD Development Team!
hardenedbsd.org·15h
🐡OpenBSD
Preview
Report Post
Tools I use
prepend.com·1d
🔌Operating system internals
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.com·4h
🔗Data Provenance
Preview
Report Post
There's a secret computer inside your computer
xda-developers.com·11h
🔒Secure Boot
Preview
Report Post
How to find things (an intro to binary search)
drmaciver.substack.com·2d·
Discuss: Substack
🌳Trie Structures
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·18h
🛡Cybersecurity
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help