Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
binary analysis, disassembly, Ghidra, radare2, executable analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184023
posts in
15.2
ms
The Two Thread
IDs
of macOS:
Measuring
P/E Core Usage on Apple Silicon
🪝
eBPF
bazhenov.me
·
6d
Thoughts
dereferenced
from the
scratchpad
noise. | What Open Source Firmware Can Learn from Apple Pre-OS Security
🔒
Capsicum
blog.3mdeb.com
·
6d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
💣
Binary Exploitation
arxiv.org
·
2d
Show HN:
SRT-Adapter
: 0.99
AUROC
, perplexity win and 16.7× recall (0.19%)
🏗️
AI Infrastructure
huggingface.co
·
4d
·
Hacker News
Hunting
a Windows ARM crash through Rust, C, and a Build-System
configurations
💣
Binary Exploitation
autoexplore.medium.com
·
6d
·
r/cpp
Release testing-44.20260429: Testing (
F44.20260429
, #
3f4b939
)
🔒
Capsicum
github.com
·
1d
Reverse Engineering the
Proscenic
850T
Robot Vacuum
🪝
eBPF
infosecwriteups.com
·
1d
MAS-SZZ
: Multi-Agentic
SZZ
Algorithm for
Vulnerability-Inducing
Commit Identification
💣
Binary Exploitation
arxiv.org
·
2d
Faithful
Autoformalization
via
Roundtrip
Verification and Repair
🌳
Parsing
arxiv.org
·
1d
contrarianAI/tools/retrieval-auditor/examples/langchain-quickstart-teardown
at main ·
kevin-luddy39/contrarianAI
🏗️
AI Infrastructure
github.com
·
2d
·
Hacker News
Embedded Rust or C Firmware? Lessons from an Industrial
Microcontroller
Use Case with
Ariel
OS
⚙️
ISA Design
arxiv.org
·
1d
Measuring the
Unmeasurable
:
Markov
Chain Reliability for LLM Agents
📋
Formal Methods
arxiv.org
·
2d
How I Built a Real-Time
Anomaly
Detection Engine for a Cloud Storage Platform
🪝
eBPF
github.com
·
1d
·
DEV
A
Metamorphic
Testing Approach to Diagnosing
Memorization
in LLM-Based Program Repair
💣
Binary Exploitation
arxiv.org
·
6d
Residual
Risk Analysis in
Benign
Code: How Far Are We? A Multi-Model Semantic and Structural Similarity Approach
💣
Binary Exploitation
arxiv.org
·
6d
My
RAG
Pipeline Was 84%
Confident
🏗️
AI Infrastructure
github.com
·
5d
·
DEV
DryRUN
: On the Role of Public
Tests
in LLM-Driven Code Generation
🔧
Compilers
arxiv.org
·
6d
OpenEPaperLink/OpenEPaperLink
: The
OpenEPaperLink
core project
🪝
eBPF
github.com
·
6d
banteg/bn
: binary ninja cli for coding agents
💣
Binary Exploitation
github.com
·
6d
I built an npm package that
eats
one line of your code every minute you're
idle
💉
JIT Spraying
github.com
·
4d
·
r/node
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help