๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Reverse Engineering

Binary Analysis, Protocol Discovery, Format Recovery, Disassembly

The Tower of Hanoi And two (three?) clever solutions
pballew.blogspot.comยท4hยท
Discuss: www.blogger.com
๐Ÿ”ฒCellular Automata
Radicle Collaborative Objects
radicle.xyzยท3d
๐Ÿ“ฆContent Addressing
Hacker plants three strains of malware in a Steam Early Access game called Chemia โ€” security company found crypto-jacking infostealers and a backdoor to install...
tomshardware.comยท1d
๐Ÿš€Indie Hacking
The Hidden Lessons in a re-frame App
lambdaisland.comยท3d
๐ŸงฉWASM Components
The U.S. Central Intelligence Agency's (CIA) remote viewing experiments
pmc.ncbi.nlm.nih.govยท29mยท
Discuss: Hacker News
๐Ÿ“ˆEntropy Estimation
How Bratags Relay Email Works: Behind the Scenes of Relay Bratags.com
bratags.comยท1dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
The perils of the real client IP (2022)
adam-p.caยท13hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
How Solid Protocol Restores Digital Agency
schneier.comยท2dยท
Discuss: Hacker News, Hacker News
๐Ÿ”—Data Provenance
Real-time Feature Generation at Lyft // Rakesh Kumar // #334
podcasters.spotify.comยท1d
๐Ÿ“ŠCount-Min Sketch
Writing experience: My decade with Org
xenodium.comยท2dยท
Discuss: Hacker News
๐Ÿฆ‹Format Metamorphosis
3D printed weapon templates have gone mainstream - and it's as bad as you think
techradar.comยท1d
๐Ÿ’ฟOptical Forensics
Detecting code copying at scale with Vendetect
blog.trailofbits.comยท5dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Electron beam method enables precise nanoscale carving and building of copper structures
phys.orgยท1d
๐Ÿ“„Document Digitization
Machine Learning Fundamentals: gradient descent example
dev.toยท2dยท
Discuss: DEV
โšกIncremental Computation
Perfecting anti-aliasing on signed distance functions
blog.pkh.meยท19hยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸŽจLUT Compression
Living Memory Attacks: Code Injection Without Files
infosecwriteups.comยท2d
๐Ÿง Memory Forensics
โšก The 5-minute routine that changed everything:
dev.toยท3hยท
Discuss: DEV
โญAwesome lists
๐Ÿš€ Claude Code just changed my entire workflow
dev.toยท1dยท
Discuss: DEV
๐Ÿฆ€Rust Macros
Machine Learning Fundamentals: feature engineering tutorial
dev.toยท3dยท
Discuss: DEV
๐ŸŒŠStream Processing
Personalization, Industrial Design, and Hacked Devices
hackaday.comยท20h
โ„๏ธNordic Design Philosophy
Loading...Loading more...
AboutBlogChangelogRoadmap