Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
disassembly, decompiler, binary analysis, IDA Pro
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
148849
posts in
18.0
ms
Reverse
Engineering
Basics
🔩
Hardware Hacking
medium.com
·
5d
Regenerator
2000 is a 6502
disassembler
with a TUI
🔩
Hardware Hacking
blog.adafruit.com
·
1d
Can LLMs
Deobfuscate
Binary Code? A Systematic Analysis of Large Language Models into
Pseudocode
Deobfuscation
🌀
Obfuscation
arxiv.org
·
3h
Your weekend
reading
from Web
Directions
🔩
Hardware Hacking
webdirections.org
·
8h
🔍 Inside My
Malware
Analysis Lab:
Static
& Dynamic Analysis in Action
🔌
Embedded Security
medium.com
·
2d
“We’re trying to
copy
this old machine,
weirdness
and all.”
🔩
Hardware Hacking
unsung.aresluna.org
·
5h
DevSecOps
Isn’t Just Security — It’s Understanding the System
🔩
Hardware Hacking
medium.com
·
10h
Giving a Second Life to
nComputing
L300
: TearDown
🔩
Hardware Hacking
hackster.io
·
6d
Data
Oriented
Design by
example
(2017)
🎮
Game Engines
nikitablack.github.io
·
51m
·
Hacker News
How
agile
practices
ensure
quality in GenAI-assisted development
💉
JIT Spraying
infoworld.com
·
22h
Dr.
Dobb
's Developer Library
DVD
6 (2010)
🔓
Binary Exploitation
news.ycombinator.com
·
15h
·
Hacker News
GaloisInc/flexdis86
🗂️
ELF Internals
github.com
·
1d
Get Your
Hands
Dirty
💉
JIT Spraying
Every via kill-the-newsletter.com
·
2d
A fully reproducible C
toolchain
rooted on
POSIX
shell
⚙️
Compilers
umontreal.scholaris.ca
·
6d
·
Hacker News
Understand business
logic
in your code with
diagram
🌀
Obfuscation
biral.io
·
4d
·
Hacker News
LLM4CodeRE
: Generative AI for Code
Decompilation
Analysis and Reverse Engineering
⚙️
Compilers
arxiv.org
·
2d
Left Security Testing (
DevSecQA
)
💣
Exploits
medium.com
·
4d
Reverse
Engineering
RustImplant
💣
Exploits
blog.yeethsecurity.com
·
4d
·
r/Malware
Letsdefend
Walkthrough: Reverse Engineering a P2P Malware
DLL
🔓
Binary Exploitation
danyelpaius.medium.com
·
6d
Towards Counterfactual Explanation and
Assertion
Inference for
CPS
Debugging
🔓
Binary Exploitation
arxiv.org
·
3h
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help