Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
binary analysis, disassembly, Ghidra, radare2, executable analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184023
posts in
25.4
ms
Reverse
Engineering
SimTower
🖥️
Bytecode VMs
phulin.me
·
1d
·
Hacker News
teenage engineering OP-1 Field 1.7:
tape
undo
before GTA 6
💣
Binary Exploitation
synthanatomy.com
·
19h
Inferring
Equivalence Classes from Legacy Undocumented Embedded
Binaries
for ISO 26262-Compliant Testing
💣
Binary Exploitation
arxiv.org
·
3d
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
💣
Binary Exploitation
github.com
·
1h
·
Hacker News
The Code Review Comment I Left 47 Times
💣
Binary Exploitation
optirefine.qzz.io
·
2d
·
DEV
Everything I know about
debugging
LLVM
⚙️
LLVM
clangbuiltlinux.github.io
·
19h
My local
agentic
dev
setup
today
🏗️
AI Infrastructure
willemvandenende.com
·
2h
·
Hacker News
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🪝
eBPF
infosecwriteups.com
·
4d
Throwing Random Arguments at System
Binaries
: Real
Segfaults
vs. Ticket Noise
💣
Binary Exploitation
communityblog.fedoraproject.org
·
2d
I built a small tool for
sorting
messy logs into something
readable
🪝
eBPF
hendrixmojo.com
·
19h
·
r/SideProject
We Have A
Technical
607: Elite Level
Trash
⚙️
Low-Level Programming
idieyoudie.com
·
2h
Reverse
Engineering
Stunt
Island with LLM
💻
Indie Hacking
marnetto.net
·
2d
·
Hacker News
Teardown of
AlphaFold
codebase
with a AST-free LLM-free static analysis engine
🏗️
AI Infrastructure
squid-protocol.github.io
·
3d
·
Hacker News
A Return to Code
💻
Indie Hacking
nav.al
·
1d
·
Hacker News
Native vs Cross
Compilation
: a Love Story, a War Story, and a
Debugging
Nightmare
💣
Binary Exploitation
carminatialessandro.blogspot.com
·
1d
·
Hacker News
IT Security Weekend
Catch
Up
💣
Binary Exploitation
badcyber.com
·
4d
ERP
for
Remanufacturing
: Scale with Microsoft Dynamics
📐
Systems Design
erpsoftwareblog.com
·
2d
[
Article
] Once You’re
Asking
the Right Question, You Don’t Need To Ask!
💣
Binary Exploitation
danq.me
·
3d
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
💣
Binary Exploitation
snyk.io
·
1d
Constraint-Guided Multi-Agent
Decompilation
for
Executable
Binary Recovery
🌐
Distributed Systems
arxiv.org
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help