🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Reverse Engineering

Binary Analysis, Protocol Discovery, Format Recovery, Disassembly

Worth Reading 062425
rule11.tech·2h
🌐DNS over QUIC
Fixes for five Lix CVEs
lix.systems·1d·
Discuss: Lobsters
❄️Nix Adoption
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·9h
🦠Malware Analysis
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
Show HN: Logcat.ai – AI-powered observability for Operating Systems | Free Beta
logcat.ai·1d·
Discuss: Hacker News
🔍eBPF
Flame Graph Performance Truth Analysis(1750839255230100)
dev.to·9h·
Discuss: DEV
⚡Performance Tools
Make Sense of a 10K+ Line GitHub Repos Without Reading the Code
kdnuggets.com·1d
🌿git
The Inefficiency in Digital Forensics
cyb3rops.medium.com·2d
🚨Incident Response
Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.sk·9h·
Discuss: Hacker News
🧩WASM Modules
I Used to Get Lost in GitHub Repos; Then I Found a Smarter Way In
hackernoon.com·1d
🔗Topological Sorting
The Interactive Handbook on Data Structures and Algorithms
cartesian.app·1d·
Discuss: Lobsters, Hacker News, Hacker News
🌳Trie Structures
Field Sensitive Escape Analysis in Golang?
reddit.com·13h·
Discuss: r/golang
🧠Lisp Dialects
Why Binary Won and Nothing Else Even Got Close
b0a04gl.site·22h·
Discuss: Hacker News
🧲RISC-V Archaeology
From Drawings to Decisions: A Hybrid Vision-Language Framework for Parsing 2D Engineering Drawings into Structured Manufacturing Knowledge
arxiv.org·1d
⟷Bidirectional Programming
Is Your Automated Software Engineer Trustworthy?
arxiv.org·1d
⚡Proof Automation
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·5h
🦠Malware Analysis
Microcontrollers: Getting Started
youtube.com·5d
🔌Microcontrollers
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·11h
📋Protocol Buffers
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
An in-depth look at the implementation of an Undo/Redo system in a large complex visual application
mlacast.com·2d·
Discuss: Hacker News, r/programming
💾Persistence Strategies
Loading...Loading more...
AboutBlogChangelogRoadmap