๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿงช Hardware Fuzzing

CPU Testing, Instruction Fuzzing, Hardware Bugs, Silicon Validation

Original Xbox Hacks: The A20 CPU Gate
connortumbleson.comยท6hยท
Discuss: Hacker News
๐ŸงฒRISC-V Archaeology
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceยท1d
๐Ÿ”ขBitwise Algorithms
Understanding Registers and Data Movement in x86-64 Assembly
blog.codingconfessions.comยท21h
๐Ÿ”งRISC-V Assembler
Built my homelab on a mini PC, time and money really do build everything.
reddit.comยท1dยท
Discuss: r/homelab
๐Ÿ Homelab Archaeology
CERT warns of UEFI vulnerabilities in Gigabyte firmware
heise.deยท2d
๐Ÿ”’Secure Boot
What people said about an OpenZFS bug
despairlabs.comยท17hยท
Discuss: Lobsters, Hacker News
๐Ÿ”’Type Safety
Trigon: exploiting coprocessors for fun and for profit (part 2)
alfiecg.ukยท1d
๐ŸŽฎSwitch Archaeology
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Mitigating the risks of package hallucination and 'slopsquatting'
techradar.comยท19h
๐Ÿ”“Hacking
FSM Library for Embedded C Projects
hackster.ioยท3d
๐Ÿฆ€Embedded Rust
A Wide Reduction Trick (2022)
words.filippo.ioยท6hยท
Discuss: Lobsters, Hacker News
๐ŸŒณArchive Merkle Trees
A Neural Net For a Graphing Calculator?
hackaday.comยท1h
๐Ÿค–Advanced OCR
How AI Detects Cancer in Whole Slide Images
hackernoon.comยท14h
๐Ÿง Machine Learning
Computer Architecture: A quantitative approach
ikerexxe.github.ioยท3d
๐Ÿ–ฅ๏ธHardware Architecture
Turbocharged Storage: MinIO, KIOXIA, and AMD team up to take on AI
blog.min.ioยท10h
๐ŸงฒRISC-V Preservation
Firefox dev says Intel Raptor Lake crashes are increasing with rising temperatures in record European heat wave โ€” Mozilla staff's tracking overwhelmed by Intel ...
tomshardware.comยท22h
๐Ÿ”ŒOperating system internals
Data Breach Today, Your Problem Tomorrow: Why Victims Deserve More Than Apologies
muckypaws.comยท12h
๐Ÿ”“Hacking
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.comยท11h
๐Ÿ”Cryptographic Archaeology
Detection Engineering: Practicing Detection-as-Code โ€“ Repository โ€“ Part 2
blog.nviso.euยท1h
๐Ÿ”„Reproducible Builds
2025-07-16: Understanding Hallucination in Large Language Models: Challenges and Opportunities
ws-dl.blogspot.comยท9hยท
Discuss: ws-dl.blogspot.com
โœจEffect Handlers
Loading...Loading more...
AboutBlogChangelogRoadmap