Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Binary Forensics
File Carving, Header Analysis, Evidence Recovery, Hex Archaeology
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23349
posts in
1.02
s
Full
Disclosure
:
Asterisk
Security Release 23.2.2
seclists.org
·
3d
🔤
EBCDIC Privacy
Getting from C
enumerations
to Python
dicts
.
colinpaice.blog
·
6d
🔧
Binary Parsing
Classes
of
Originality
jacquesmattheij.com
·
3d
⚡
Proof Automation
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
6d
🎫
Kerberos Exploitation
Built a tiny fast library for catching
obvious
prompt
injections
reddit.com
·
4d
·
Discuss:
r/golang
🧪
Binary Fuzzing
Full Disclosure: Certified
Asterisk
Security Release
certified-20.7-cert9
seclists.org
·
3d
❄️
Nixpkgs
Hello Edge: Keyword
Spotting
on
Microcontrollers
dev.to
·
4d
·
Discuss:
DEV
🔢
Bitwise Algorithms
Stop Guessing Your Health! Build a "Personal Health Oracle" using RAG,
Pinecone
, and
PubMed
dev.to
·
3d
·
Discuss:
DEV
🌀
Brotli Internals
CodeCircuit
: Toward
Inferring
LLM-Generated Code Correctness via Attribution Graphs
arxiv.org
·
1d
📏
Code Metrics
Trojans in Artificial Intelligence (
TrojAI
) Final Report
arxiv.org
·
1d
🌐
WARC Forensics
How were the
NIST
ECDSA
curve parameters generated? (2023)
saweis.net
·
3d
·
Discuss:
Hacker News
🔐
Hash Functions
Computing large
Fibonacci
numbers
johndcook.com
·
3d
·
Discuss:
Hacker News
📐
Interval Arithmetic
Full-circle Test-driven
Firmware
Development with
OpenClaw
blog.adafruit.com
·
3d
·
Discuss:
Hacker News
🔍
Concolic Testing
Making
Pyrefly
Diagnostics
18x Faster
pyrefly.org
·
5d
·
Discuss:
Hacker News
🌳
Incremental Parsing
Show HN: Competitor
Finder
API – find real competitors from one
hostname
champsignal.com
·
3d
·
Discuss:
Hacker News
🔍
BitFunnel
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
3d
·
Discuss:
Hacker News
🔐
Archive Encryption
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
5d
·
Discuss:
Hacker News
📦
Container Security
A
Horrible
Conclusion
addisoncrump.info
·
4d
·
Discuss:
Lobsters
,
Hacker News
🔓
Hacking
Notes for February 2-7
taoofmac.com
·
3d
·
Discuss:
Hacker News
🐚
Bash Monads
Binutils
2.46 Released – AMD, ARM, RISC-V,
SFrame
v3
sourceware.org
·
2d
·
Discuss:
Hacker News
🔗
Static Linking
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help