Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Binary Analysis, Protocol Discovery, Format Recovery, Disassembly
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23405
posts in
552.4
ms
Auditing
Rust
Crates
Effectively
arxiv.org
·
2d
🔬
Binary Analysis
James
Eichbaum
, Founder,
Elusive
Data
forensicfocus.com
·
1d
🗃️
Database Forensics
Leaded
Solder
vs. The Crazy 77
leadedsolder.com
·
1d
⚡
Circuit Archaeology
Linux 7.0 Adds support For
BPF
Filtering To IO_
uring
phoronix.com
·
1d
🔍
eBPF
Show HN:
Self-healing
data pipeline for F1
telemetry
(Python and Type Inference)
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🎯
Gradual Typing
Microsoft just built a
scanner
that exposes hidden LLM
backdoors
techradar.com
·
17h
🔍
NTLM Forensics
Main
Content ||
Math
∩ Programming
jeremykun.com
·
2d
🧮
Kolmogorov Complexity
Skeeter-Scan
16
hackster.io
·
1d
🔬
Floppy imaging
Ethereum Signature Schemes Explained: ECDSA, BLS,
XMSS
, and Post-Quantum
leanSig
with Rust Code Examples
blog.lambdaclass.com
·
1d
🔗
Hash Chains
New tool cracks
microbial
defense codes for faster, precise
bioengineering
phys.org
·
1d
📄
Document Digitization
Show HN:
Symdex-100
– Intent-based code search using 20-byte "
Cypher
" metadata
github.com
·
1d
·
Discuss:
Hacker News
🔍
BitFunnel
C-- Home
cs.tufts.edu
·
1d
·
Discuss:
Lobsters
🔗
Concatenative Programming
RISC-V
Mentorship
Taught Me the RISC-V
ISA
Is Far More Than a Reference Manual
riscv.org
·
19h
🧩
RISC-V Assembly
Valuable
News
discoverbsd.com
·
1d
🔌
Operating system internals
Fork
, Explore, Commit: OS
Primitives
for Agentic Exploration
arxiv.org
·
1d
🧲
RISC-V Archaeology
Choosing
the Right Strategy: Cold Boot
Forensics
vs Live System Analysis
blog.elcomsoft.com
·
2d
🔍
NTLM Forensics
From PDFs to Proof Pipelines: Building Audit-Grade
Traceability
in
Regulated
Deep-Tech
hackernoon.com
·
2d
🔗
Hash Chains
Manufacturing
QMS
Software
samrian.com
·
1d
·
Discuss:
Hacker News
⚙️
Proof Engineering
Building a Fake News Kill Chain with
VeraSnap
and
CPP
— Full Implementation from Capture to Verification
dev.to
·
4d
·
Discuss:
DEV
🌳
Archive Merkle Trees
HTTP/2
From
Scratch
: Part 1
kmcd.dev
·
1h
⚡
gRPC
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help