๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” RISC-V Forensics

Hardware Security, Instruction Analysis, Open Architecture Investigation

miniHDL: A Python Hardware Description Language DSL
nicholas.carlini.comยท6hยท
Discuss: Hacker News
โšกCircuit Design
x86 and ARM architectures comparison thread.
forums.anandtech.comยท14h
๐Ÿš€RISC-V Vector
IT Security Weekend Catch Up โ€“ August 1, 2025
badcyber.comยท4h
๐Ÿ”“Hacking
Machine Learning Fundamentals: logistic regression tutorial
dev.toยท7hยท
Discuss: DEV
๐ŸŒŠStream Processing
Raspberry Pi RP2350 A4 Stepping Addresses E9 Current Leakage Bug
hackaday.comยท18h
๐Ÿ”ŒSingle Board PC
Lobsters Interview with Icefox
lobste.rsยท6hยท
Discuss: Lobsters
๐Ÿฆ€Rust Macros
Exploiting vulnerabilities in the Blink video doorbell
jacksondonaldson.comยท11hยท
Discuss: Hacker News
๐Ÿ›ก๏ธRISC-V Security
Mac.c Stealer Takes on AMOS:
hackernoon.comยท1d
๐Ÿ–ฅ๏ธVintage Macintosh
C++ Instrumentation with Memory Sanitizer
systemsandco.devยท17hยท
Discuss: Hacker News
๐Ÿ”“Decompilation
Framework 12, Clear Linux Going EOL, AMD EPYC Performance & Other Excitement In July
phoronix.comยท13h
๐Ÿ”ŒOperating system internals
Fall Detection System
hackster.ioยท4h
๐Ÿ Home Automation
Finished trace by trace and datasheet by datasheet examination; one issue arose that must be pondered
rescue1130.blogspot.comยท2dยท
Discuss: rescue1130.blogspot.com
๐Ÿ”งHardware Verification
ToolShell under siege: Check Point analyzes Chinese APT Storm-2603
securityaffairs.comยท12h
๐Ÿ’ฃZIP Vulnerabilities
Vibe coding complex changes in Rust
youtube.comยท2h
๐Ÿฆ€Rust Macros
Go Assembly Mutation Testing
words.filippo.ioยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸงชProperty-Based Testing
Three senior execs to retire from Intel Foundry, including respected semiconductor veteran Gary Patton
tomshardware.comยท4h
๐ŸงฒRISC-V Archaeology
Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations
forensicfocus.comยท1d
๐ŸšจIncident Response
Accelerating Offensive R&D with Large Language Models
outflank.nlยท1d
๐Ÿ”’WASM Capabilities
A safer memcpy with very limited use cases
subethasoftware.comยท5h
๐ŸงชBinary Fuzzing
Launch HN: Gecko Security (YC F24) โ€“ AI That Finds Vulnerabilities in Code
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap