๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Reverse Engineering

Binary Analysis, Protocol Discovery, Format Recovery, Disassembly

Reverse-Engineering Game Boy Advance Games (and General Advice)
nytpu.comยท23h
๐ŸŽฎGame Decompilation
Crypto Recovery Specialist โ€“ Blockchain Investigator โ€“ Helping Victims Reclaim
news.ycombinator.comยท1hยท
Discuss: Hacker News
โ›๏ธFile Carving
Automated Code Repair for C/C++ Static Analysis Alerts
arxiv.orgยท19h
๐Ÿ“ŠStatic Analysis
Digital Forensics Round-Up, August 06 2025
forensicfocus.comยท7h
๐Ÿ”Archive Cryptanalysis
Thinking in Hoses and Wires, Not Bolted Gears (Protocol-Driven Development)
github.comยท8hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
KeyCraft M5
hackster.ioยท2h
โš™๏ธDIY Electronics
Project Ire autonomously identifies malware at scale
microsoft.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿฆ Malware Analysis
Talk Highlights: Documenting the Design of the Linux Kernel โ€“ Chuck Wolber, The Boeing Company; Kate Stewart, The Linux Foundaiton; Gabriele Paoloni, Red Hat
elisa.techยท16h
๐Ÿ“œProof Carrying Code
How To Solve Every Programming Problem
blog.codeminer42.comยท3h
๐Ÿ“Interval Arithmetic
HTTP/1.1 Must Die: What This Means for Contract Pentesters and MSSPs
portswigger.netยท39m
๐Ÿ›ฃ๏ธBGP Hijacking
Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource
blackhillsinfosec.comยท7h
๐Ÿ›กCybersecurity
Ethernet Overload
blogger.comยท58m
๐Ÿ”ŒOperating system internals
Quantum physics protects videos from prying eyes and tampering
space.comยท2h
โš›๏ธQuantum Tape
External Network Penetration Testing and Best Practices
hackerone.comยท6h
๐Ÿ•ต๏ธPenetration Testing
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท2d
โš—๏ธAlgebraic Coding
Driver of destruction: How a legitimate driver is being used to take down AV processes
securelist.comยท13h
๐Ÿ›ก๏ธeBPF Security
Building a Home Lab for Self-Hosting & Cybersecurity Labs - What Do You Think of This Setup ?
preview.redd.itยท7hยท
Discuss: r/homelab
๐Ÿ HomeLab
Revival Hijacking: How Deleted PyPI Packages Become Threats
protsenko.devยท2hยท
Discuss: Hacker News
๐Ÿ“ฆPackage Managers
Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท1d
โœ…Archive Validation
'ReVault' Security Flaws Impact Millions of Dell Laptops
darkreading.comยท2h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap