Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔬 Reverse Engineering
Binary Analysis, Disassembly, Debugging, Software Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187234
posts in
13.4
ms
banteg/bn
: binary ninja cli for coding agents
⌨
CLI Development
github.com
·
6d
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
🔄
Autonomous Agents
arxiv.org
·
2d
[
Article
] Once You’re
Asking
the Right Question, You Don’t Need To Ask!
🔧
Code Refactoring Patterns
danq.me
·
4d
Princess
Grace
's Linux Tech Tips
🐧
Linux
perfect.hypnovir.us
·
3d
ZimaBoard
2 Tech Dive: The x86 Home Server That Fits in Your Hand (inc.
Disassembly
)
💾
Retro Computing
youtu.be
·
6d
·
r/homelab
Re-learning C, going through the
examples
in K&R. Here is the library so far
🔵
Go
codeberg.org
·
3d
·
r/C_Programming
contrarianAI/tools/retrieval-auditor/examples/langchain-quickstart-teardown
at main ·
kevin-luddy39/contrarianAI
🔍
RAG
github.com
·
3d
·
Hacker News
I Built a Fast JSON
Viewer
with Tree View, Search, and Zero
Backend
🔌
Headless CMS
toolshelf.pro
·
6d
·
DEV
WaTF
Bank
Walkthrough
(Part 4): Exploiting Android App Security Flaws
🔐
Hardware Security
infosecwriteups.com
·
1d
DeepCantCode
20 Best Prompt Engineering
Techniques
💬
Prompt Engineering
ko-fi.com
·
4d
·
r/PromptEngineering
COBOL
Migration Strategy:
Preserve
Logic, Add APIs
💬
Prompt Engineering
horizon.dev
·
6d
·
DEV
Podcast: A Java Performance Quest:
Taming
Unsafe Code, Embracing
Idiomatic
Style & Debugging the Linux Kernel
🚀
Performance
infoq.com
·
3d
AsmRAG
: LLM-Driven Malware Detection by Retrieving
Functionally
Similar Assembly Code
🦙
Ollama
arxiv.org
·
2d
The
debugging
wars:
Cursor
3 takes aim at Claude Code’s agentic edge
💬
AI Code Assistants
thenewstack.io
·
4d
Why Is Everything
Proprietary
These Days?
🔐
Hardware Security
kevquirk.com
·
4d
·
Hacker News
Release 4.6.1 - 2026-04-26
❄️
Nix
github.com
·
4d
Empowering
Autonomous
Debugging
Agents with Efficient Dynamic Analysis
⚡
AI-Driven DevOps
arxiv.org
·
2d
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🔓
DRM Analysis
infosecwriteups.com
·
4d
MAS-SZZ
: Multi-Agentic
SZZ
Algorithm for
Vulnerability-Inducing
Commit Identification
🛡
Vulnerability Management
arxiv.org
·
2d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🔓
DRM Analysis
arxiv.org
·
2d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help