🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Format Reverse Engineering

Binary Analysis, Structure Recovery, Protocol Discovery, Legacy Formats

A Wide Reduction Trick (2022)
words.filippo.io·14h·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Machine Learning Fundamentals: dimensionality reduction tutorial
dev.to·1h·
Discuss: DEV
📐Vector Dimensionality
Detection Engineering: Practicing Detection-as-Code – Repository – Part 2
blog.nviso.eu·9h
🔄Reproducible Builds
Decrypting DPAPI Credentials Offline
infosecwriteups.com·11h
🕸️WebAssembly
AI & Ransomware: Inside the Exfiltration Playbook
backblaze.com·1h
🔓Hacking
Automated Function ID Database Generation in Ghidra on Windows
blog.mantrainfosec.com·5h·
Discuss: Hacker News
🔓Decompilation
About our proof-of-concept LLM tool for navigating Debian's manpages
gwolf.org·5h
🦀Rust Macros
Regex Is a 70-Year-Old Dinosaur—Here’s the Modern Alternative
hackernoon.com·10h
🔍RegEx Engines
Go at american express today
americanexpress.io·18h
🔌Interface Evolution
State of the Art of Prompt Engineering • Mike Taylor • GOTO 2025
youtube.com·5h
🖥️Terminal Renaissance
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·1d
🧮Z3 Solver
Visualising the Trade Lifecycle - Phase 1 - Building a React SPA with Multiple AIs
blog.scottlogic.com·2h
🔌Interface Evolution
Programmable DNA moiré superlattices: Expanding the material design space at the nanoscale
phys.org·1h
💎Information Crystallography
AwesomeAssertions/AwesomeAssertions
github.com·1d
✅Format Verification
Checking data integrity
eclecticlight.co·1d
✅Checksum Validation
Understanding Registers and Data Movement in x86-64 Assembly
blog.codingconfessions.com·1d
🔧RISC-V Assembler
An engineer’s path from data loss to software preservation
softwareheritage.org·1d
🔄Archival Workflows
Mitigating the risks of package hallucination and 'slopsquatting'
techradar.com·1d
🔓Hacking
From Paper to Proof: How We Can Formally Verify Blockchain Protocols with Lean4
medium.com·3h·
Discuss: Hacker News
🤝Distributed Consensus
How to Use Knowledge Enrichment to Transform Unstructured Data
info.aiim.org·6h
🤖Archive Automation
Loading...Loading more...
AboutBlogChangelogRoadmap