Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Binary Analysis, Protocol Discovery, Format Recovery, Disassembly
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186532
posts in
28.1
ms
Reverse
Engineering & Hardware
Hacking
🔬
Hardware Forensics
malware.news
·
12h
Inferring
Equivalence Classes from Legacy Undocumented Embedded
Binaries
for ISO 26262-Compliant Testing
🧪
Binary Fuzzing
arxiv.org
·
4d
Reverse
Engineering
SimTower
🎮
Game Decompilation
phulin.me
·
1d
·
Hacker News
,
r/programming
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
🛡️
CLI Security
github.com
·
18h
·
Hacker News
Name that
Ware
, April 2026
🖥️
Hardware Architecture
bunniestudios.com
·
1d
The Code Review Comment I Left 47 Times
📏
Code Metrics
optirefine.qzz.io
·
3d
·
DEV
Continuing
the story of early DOS development
🧲
RISC-V Archaeology
opensource.microsoft.com
·
2d
·
Hacker News
,
Hacker News
Reverse Engineering the
Proscenic
850T
Robot Vacuum
📼
Cassette Hacking
infosecwriteups.com
·
2d
ERP
for
Remanufacturing
: Scale with Microsoft Dynamics
🏛️
Mainframe Archaeology
erpsoftwareblog.com
·
3d
teenage engineering OP-1 Field 1.7:
tape
undo
before GTA 6
🎛️
Cassette DSP
synthanatomy.com
·
1d
IT Security Weekend
Catch
Up
🛡
Cybersecurity
badcyber.com
·
5d
Hardware
Hacking
Goes Mobile
🔬
Hardware Forensics
hackster.io
·
2d
Reverse
Engineering
Stunt
Island with LLM
🎮
Game Decompilation
marnetto.net
·
3d
·
Hacker News
From
Mirage
to Grounding: Towards Reliable Multimodal
Circuit-to-Verilog
Code Generation
🔍
FPGA Verification
arxiv.org
·
6h
My
RAG
Pipeline Was 84%
Confident
✅
Archive Validation
github.com
·
5d
·
DEV
REBENCH
: A Procedural, Fair-by-Construction Benchmark for LLMs on
Stripped-Binary
Types and Names (Extended Version)
🔗
Functional Compilers
arxiv.org
·
6h
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🦠
Malware Analysis
infosecwriteups.com
·
5d
Verification and Validation (V&V)-in-the-Loop for RISC-V Design: The
Holistic
Vision of
BZL
⚖️
RISC-V Formal
arxiv.org
·
6h
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
🔓
Decompilation
arxiv.org
·
3d
AsmRAG
: LLM-Driven Malware Detection by Retrieving
Functionally
Similar Assembly Code
🔗
Binary Similarity
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help