Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
25188
posts in
464.1
ms
The βNode 1.9β
Miracle
: How to Turn Your Bitcoin into a Hard
Lesson
in Cybersecurity
infosecwriteups.com
Β·
10h
π
Hash Chains
Intego
X9: When your macOS
antivirus
becomes your enemy
blog.quarkslab.com
Β·
1d
β
Archive Fixity
Rethinking
TXT
Files
dataabinitio.com
Β·
1d
β
Format Validation
Yet Another
YAML
kriskowal.com
Β·
2h
Β·
Discuss:
Hacker News
π§
Binary Parsers
RISC-V
Mentorship
Taught Me the RISC-V
ISA
Is Far More Than a Reference Manual
riscv.org
Β·
11h
π§©
RISC-V Assembly
Linux 7.0 Adds support For
BPF
Filtering To IO_
uring
phoronix.com
Β·
15h
π
eBPF
FreeBSD
Errata
Notice FreeBSD-EN-26:
04.arm64
bsdsec.net
Β·
10h
π‘
OpenBSD
The hunt for
truly
zero-CVE
container images
thenewstack.io
Β·
9h
π¦
Container Security
Malicious 7-Zip site
distributes
installer
laced
with proxy tool
bleepingcomputer.com
Β·
7h
π£
ZIP Vulnerabilities
From Folder
Deletion
to Admin: Lenovo
Vantage
(CVEβ2025β13154)
blog.compass-security.com
Β·
20h
π£
ZIP Vulnerabilities
Skeeter-Scan
16
hackster.io
Β·
17h
π¬
Floppy imaging
When is a
bug
not a
bug
?
blog.zarfhome.com
Β·
1h
π§ͺ
Binary Fuzzing
Building a Fake News Kill Chain with
VeraSnap
and
CPP
β Full Implementation from Capture to Verification
dev.to
Β·
4d
Β·
Discuss:
DEV
π³
Archive Merkle Trees
Researchers Can Now
Identify
If Your AI
Stole
Its Training Data
hackernoon.com
Β·
7h
π΅οΈ
Vector Smuggling
New tool cracks
microbial
defense codes for faster, precise
bioengineering
phys.org
Β·
1d
π
Document Digitization
Hydra
: Robust Hardware-Assisted
Malware
Detection
arxiv.org
Β·
23h
π
Binary Similarity
Using an AI agent to design and ship a Rust
diff
fingerprinting
algorithm
argos-ci.com
Β·
1d
Β·
Discuss:
Hacker News
π
Binary Similarity
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
Β·
3d
π
Hacking
C-- Home
cs.tufts.edu
Β·
23h
Β·
Discuss:
Lobsters
π
Concatenative Programming
SolarWinds
Web Help Desk
Exploitation
elastic.co
Β·
1d
π«
Kerberos Exploitation
Loading...
Loading more...
« Page 1
β’
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help