Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🪝 eBPF
Specific
extended BPF, bpftrace, libbpf, XDP, kernel probes
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184398
posts in
23.5
ms
eBPF
Fellowship Update:
Tutorials
, Research, and Expanding
eBPF
into GPU and AI
🏗️
AI Infrastructure
ebpf.foundation
·
3d
PEAKS No 42: The Open-Weight Uprising: GPT-5.5, Qwen Beats a
397B
Giant, and Your
Jira
Data Is Now AI Training Fuel
🏗️
AI Infrastructure
bogdandeac.com
·
2d
Seven new
stable
kernels
for Thursday
🫀
Microkernels
lwn.net
·
1h
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
💣
Binary Exploitation
arxiv.org
·
10h
open-telemetry/opentelemetry-ebpf-instrumentation
🔍
Reverse Engineering
github.com
·
1d
Exploiting
Vulnerable
Drivers
💉
JIT Spraying
textslashplain.com
·
20h
Bypassing
DPI
with
eBPF
, no VPN or proxy needed
💣
Binary Exploitation
bora.sh
·
4d
·
Lobsters
,
Hacker News
Full Disclosure:
ESP-RFID-Tool
v2 PRO
💣
Binary Exploitation
seclists.org
·
21h
Boosting speed: Use eBPF and
netstacklat
to
troubleshoot
latency
📡
Protocol Design
developers.redhat.com
·
1d
FreeBSD
Security Advisory
FreeBSD-SA-26
:
16.libnv
😈
FreeBSD
bsdsec.net
·
19h
Tracing
Node.js Services with
OpenTelemetry
(Complete Guide)
🔍
DTrace
dash0.com
·
2d
·
r/node
At Machine Speed
💣
Binary Exploitation
matthiasott.com
·
6d
GitHub Uses
eBPF
to
Eliminate
Deployment Risks and Prevent Circular Failures
💻
bhyve
infoq.com
·
2d
GnuPG
– post-quantum crypto landing in
mainline
💣
Binary Exploitation
lists.gnupg.org
·
4d
·
Hacker News
Reimagining Kernel Generation at the
PTX
Layer: An LLM System Learning from
DSLs
to Outperform Them
⚡
PTX
standardkernel.com
·
2d
·
Hacker News
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
💣
Binary Exploitation
arxiv.org
·
10h
Architecting
Cost-Aware LLM
Workloads
with Model Router in Microsoft Foundry
🏗️
AI Infrastructure
techcommunity.microsoft.com
·
1d
From
Netdata
Inspiration to SaaS MVP: Server Monitoring with
Bun
+ Claude Code Opus 4.6
💣
Binary Exploitation
netdata.cloud
·
4d
·
DEV
The Malware Factory:
GLASSWORM
Forensics in Open
VSX
💣
Binary Exploitation
blog.yeethsecurity.com
·
1d
·
r/Malware
TurboQuant
on a MacBook Pro, part 2: perplexity, KL
divergence
, and asymmetric K/V on M5 Max
🔧
Custom CPUs
llmkube.com
·
1d
·
r/LocalLLaMA
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help