Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23005
posts in
1.33
s
Computer
Forensic
Tools Comparison
Chart
2026
cybertriage.com
·
4h
🔍
Digital Forensics
pmarreck/validate
: a full binary file format validator for over 100 (EDIT: now around 150) different
filetypes
, written in Zig with frontier AI assistance
github.com
·
15m
✅
FLAC Verification
Quantum
Scrambler
—
picoCTF
2025 Writeup
infosecwriteups.com
·
5h
⚛️
Quantum Codes
REMnux
v8
: 15 Years of Building a Malware Analysis Toolkit
zeltser.com
·
1d
🦠
Malware Analysis
We hid
backdoors
in
binaries
– Opus 4.6 found 49% of them
quesma.com
·
1d
·
Discuss:
Hacker News
,
Hacker News
,
r/ClaudeAI
,
r/programming
🦠
Malware Analysis
Creating
massively
huge fake files and
binaries
fzakaria.com
·
10h
💣
Compression Security
Efficient Special
Stain
Classification
arxiv.org
·
1d
🔤
Character Classification
Digital
Forensics
Round-Up, February 11 2026
forensicfocus.com
·
19h
⚖️
Digital Evidence
Proof-oriented
Programming in F*
fstar-lang.org
·
6h
·
Discuss:
Lobsters
👑
Isabelle
Show HN:
Symdex-100
– Intent-based code search using 20-byte "
Cypher
" metadata
github.com
·
1d
·
Discuss:
Hacker News
🔍
BitFunnel
Four Seconds to Botnet - Analyzing a Self
Propagating
SSH Worm with
Cryptographically
Signed C2 [Guest Diary], (Wed, Feb 11th)
isc.sans.edu
·
8h
🏠
Homelab Pentesting
Incident
with
Codespaces
githubstatus.com
·
3h
🔓
Decompilation
Nation-State Actors
Exploit
Notepad
++ Supply Chain
unit42.paloaltonetworks.com
·
11h
🛡️
eBPF Security
SCPI
and Hardware
Instrumentation
for Reverse Engineers
voidstarsec.com
·
1d
🔌
Single Board PC
The game is over: when “free” comes at too high a price. What we know about
RenEngine
securelist.com
·
20h
🎮
Cartridge Archaeology
Hacking
the
Maclock
taoofmac.com
·
2d
📼
Cassette Hacking
What I’m Learning in Data Structures: The Algorithm Behind
Compression
(
bzip
, etc.)
dev.to
·
11h
·
Discuss:
DEV
📝
Text Compression
Maximizing
Diversity in (near-)
Median
String Selection
arxiv.org
·
1d
🔍
MIN Hash
Fake
recruiter
campaign targets crypto developers with
RAT
reversinglabs.com
·
20h
🚀
Indie Hacking
Relay
Inspect
MCP
solomon.io
·
1d
🔍
Reverse Engineering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help