๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Reverse engineering
Cheating? Or the acumen of modern programming? FOSS, "AI", and human conscience
gist.github.comยท18hยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Philips Hue White Ambiance is actually terribleโ€ฆ
wejn.orgยท6h
๐Ÿ•นEmulation
Why Even Legendary Games Like Wesnoth Hide Bugs in Plain Sight
hackernoon.comยท13h
๐Ÿ“œProof Carrying Code
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
Automated Function ID Database Generation in Ghidra on Windows
blog.mantrainfosec.comยท8hยท
Discuss: Hacker News
๐Ÿ”“Decompilation
Marooned: Diamonds to Dust
bluerenga.blogยท3h
๐ŸŽฎGame Decompilation
About our proof-of-concept LLM tool for navigating Debian's manpages
gwolf.orgยท9h
๐Ÿฆ€Rust Macros
What people said about an OpenZFS bug
despairlabs.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”’Type Safety
State of the Art of Prompt Engineering โ€ข Mike Taylor โ€ข GOTO 2025
youtube.comยท8h
๐Ÿ–ฅ๏ธTerminal Renaissance
CVE-2024-12029 โ€“ InvokeAI Deserialization of Untrusted Data vulnerability
offsec.comยท3h
๐ŸŒWASI
Machine Learning Fundamentals: dimensionality reduction tutorial
dev.toยท5hยท
Discuss: DEV
๐Ÿ“Vector Dimensionality
AtCoder Finals Problem Statement
atcoder.jpยท1dยท
Discuss: Hacker News
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
How to actually use Model Context Protocol
seangoedecke.comยท20h
โšกProof Automation
A Wide Reduction Trick (2022)
words.filippo.ioยท17hยท
Discuss: Lobsters, Hacker News
๐ŸŒณArchive Merkle Trees
A Neural Net For a Graphing Calculator?
hackaday.comยท12h
๐Ÿค–Advanced OCR
I'm Switching to Python and Actually Liking It
cesarsotovalero.netยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Undone Computer Science
undonecs.orgยท8hยท
Discuss: Hacker News
๐ŸŒCultural Algorithms
Detection Engineering: Practicing Detection-as-Code โ€“ Repository โ€“ Part 2
blog.nviso.euยท12h
๐Ÿ”„Reproducible Builds
Parsing Safetensors File Format in C
leetarxiv.substack.comยท2dยท
Discuss: Substack, r/programming
โœ…Format Verification
Decrypting DPAPI Credentials Offline
infosecwriteups.comยท14h
๐Ÿ•ธ๏ธWebAssembly
Loading...Loading more...
AboutBlogChangelogRoadmap