🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔍 Reverse Engineering

Binary Analysis, Protocol Discovery, Format Recovery, Disassembly

Intuitions about records management for data scientists
thinkingrecords.co.uk·1d
🔗Data Provenance
When Hackers Get Hacked: Lessons From Underground Betrayals
lmgsecurity.com·2d
🔓Hacking
Exploring Interlisp-10 and Twenex
journal.paoloamoroso.com·14h·
Discuss: Hacker News
📺VT100 Emulation
On Becoming an Engineer at Dropbox
nikrad.io·2d·
Discuss: Hacker News
⚙️Proof Engineering
MonadBFT: Fast, Responsive, Fork-Resistant Streamlined Consensus
category.xyz·2d·
Discuss: Hacker News
🤝Distributed Consensus
The Three Sacred Guardrails of AI
aboard.com·1d·
Discuss: Hacker News
⚡Proof Automation
Carolina Codes 2025: My First-Time Speaker Experience
dev.to·2d·
Discuss: DEV
⚙️Proof Engineering
The Hands Can Tell A Lot
hackster.io·22h
✋Tactile Computing
Matmul on Blackwell: Part 2 – Using Hardware Features to Optimize Matmul
modular.com·13h·
Discuss: Hacker News
⚡SIMD Optimization
AutoDetect: Designing an Autoencoder-based Detection Method for Poisoning Attacks on Object Detection Applications in the Military Domain
arxiv.org·2d
🔍Vector Forensics
How QR Codes Work (and How to Make Your Own in Python)
dev.to·1d·
Discuss: DEV
📱QR Archaeology
The Unsolved case of P Mariammal
infosecwriteups.com·1d
🛣️BGP Hijacking
Go from Zero to a Full-Stack, Type-Safe, Cross-Platform App in Seconds
dev.to·7h·
Discuss: DEV
🔄Language Evolution
Galactic Algorithm
en.wikipedia.org·1d·
Discuss: Hacker News
🎯Performance Proofs
Context Engineer MCP – Fixing Context Loss in AI Coding Agents
contextengineering.ai·1d·
Discuss: Hacker News
⚡Proof Automation
Cut Costs, Not Accuracy: LLM-Powered Data Processing with Guarantees
arxiv.org·2d
💻Local LLMs
No-CPU Amiga Demo and Framework
github.com·15h·
Discuss: Hacker News
⚡Homebrew CPUs
Robots by Request: Designing Intelligent Machines with Natural Language by Arvind Sundararajan
dev.to·7h·
Discuss: DEV
🤖AI Translation
Evaluating Diverse Feature Extraction Techniques of Multifaceted IoT Malware Analysis: A Survey
arxiv.org·2d
🦠Malware Analysis
A Bio-Acoustic Signal Decryption & Delivery System for Targeted Insect Predator Attraction
dev.to·11h·
Discuss: DEV
👂Audio Evidence
Loading...Loading more...
AboutBlogChangelogRoadmap