🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Reverse Engineering

Binary Analysis, Protocol Discovery, Format Recovery, Disassembly

EPYTEST_PLUGINS and other goodies now in Gentoo
blogs.gentoo.org·14h
⚡Proof Automation
AI, Archives, and the Future of Information Governance: Key Insights from NAGARA 2025
info.aiim.org·2d
🔄Archival Workflows
40 years ago, Andy Warhol helped debut the Commodore Amiga computer
popsci.com·2d·
Discuss: Hacker News
🖥️Vintage Macintosh
Custom mechanical keyboard: OS-specific custom RGB lighting with QMK
quantum5.ca·3d·
Discuss: Lobsters, Hacker News
⌨️Mechanical Keyboards
Bringing a Decade Old Bicycle Navigator Back to Life with Open Source Software (and DOOM)
raymii.org·1d·
Discuss: Lobsters, Hacker News, Hacker News
🕸️WASM Archives
I wrote the worlds worst emulator to reverse engineer the c64 Bubble Bobble RNG
geon.github.io·2d·
Discuss: r/programming
🎮Gameboy Emulation
Technical approach for classifying human-AI interactions at scale
microsoft.com·3d·
Discuss: Hacker News
🌀Brotli Internals
Your name is still on it
sanitarium.se·2d·
Discuss: Hacker News
⚡Proof Automation
Electron beam irradiation decomposes Teflon-like fluoroplastics efficiently
phys.org·2d
🌡️Preservation Physics
Docker’s Biggest Security Threat: How Python Stops Container Attacks
thenewstack.io·2d
📦Container Security
The Joy of a Boring Codebase
trunk.io·2d·
Discuss: Hacker News
📏Code Metrics
I Published My First Python Library: `rs-calculator`
dev.to·17h·
Discuss: DEV
📚Lempel-Ziv
FreeBSD Guide to Lock-In Free Infrastructure
discoverbsd.com·1d
🔌Operating system internals
Unveiling the Secrets of Data: Confidence Intervals and Hypothesis Testing in Machine Learning
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Detecting code copying at scale with Vendetect
blog.trailofbits.com·5d·
Discuss: Hacker News
🚀Indie Hacking
Machine Learning Fundamentals: gradient descent example
dev.to·2d·
Discuss: DEV
⚡Incremental Computation
Perfecting anti-aliasing on signed distance functions
blog.pkh.me·13h·
Discuss: Lobsters, Hacker News, r/programming
🎨LUT Compression
Living Memory Attacks: Code Injection Without Files
infosecwriteups.com·2d
🧠Memory Forensics
Machine Learning Fundamentals: feature engineering tutorial
dev.to·3d·
Discuss: DEV
🌊Stream Processing
Electron beam method enables precise nanoscale carving and building of copper structures
phys.org·1d
📄Document Digitization
Loading...Loading more...
AboutBlogChangelogRoadmap