Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
binary analysis, disassembly, Ghidra, radare2, executable analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184445
posts in
26.4
ms
Reverse
Engineering
SimTower
🖥️
Bytecode VMs
phulin.me
·
1d
·
Hacker News
teenage engineering OP-1 Field 1.7:
tape
undo
before GTA 6
💣
Binary Exploitation
synthanatomy.com
·
17h
Inferring
Equivalence Classes from Legacy Undocumented Embedded
Binaries
for ISO 26262-Compliant Testing
💣
Binary Exploitation
arxiv.org
·
3d
Flo1632/reiseki
: Local-first AI assistant for files, reminders, and document generation
🏗️
AI Infrastructure
github.com
·
25m
·
DEV
The Code Review Comment I Left 47 Times
💣
Binary Exploitation
optirefine.qzz.io
·
2d
·
DEV
Everything I know about
debugging
LLVM
⚙️
LLVM
clangbuiltlinux.github.io
·
17h
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🪝
eBPF
infosecwriteups.com
·
4d
I built a small tool for
sorting
messy logs into something
readable
🪝
eBPF
hendrixmojo.com
·
17h
·
r/SideProject
Throwing Random Arguments at System
Binaries
: Real
Segfaults
vs. Ticket Noise
💣
Binary Exploitation
communityblog.fedoraproject.org
·
2d
Reverse
Engineering
Stunt
Island with LLM
💻
Indie Hacking
marnetto.net
·
2d
·
Hacker News
Teardown of
AlphaFold
codebase
with a AST-free LLM-free static analysis engine
🏗️
AI Infrastructure
squid-protocol.github.io
·
3d
·
Hacker News
A Return to Code
💻
Indie Hacking
nav.al
·
1d
·
Hacker News
Native vs Cross
Compilation
: a Love Story, a War Story, and a
Debugging
Nightmare
💣
Binary Exploitation
carminatialessandro.blogspot.com
·
1d
·
Hacker News
IT Security Weekend
Catch
Up
💣
Binary Exploitation
badcyber.com
·
4d
ERP
for
Remanufacturing
: Scale with Microsoft Dynamics
📐
Systems Design
erpsoftwareblog.com
·
2d
[
Article
] Once You’re
Asking
the Right Question, You Don’t Need To Ask!
💣
Binary Exploitation
danq.me
·
3d
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
💣
Binary Exploitation
snyk.io
·
1d
Your old Nintendo 64 games are finally getting
unofficial
PC ports, and they run better than
emulators
🕹️
Emulators
xda-developers.com
·
1d
deepseek-ai/DeepSeek-V4-Flash
🏗️
AI Infrastructure
huggingface.co
·
6d
·
Hacker News
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
🌐
Distributed Systems
arxiv.org
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help