Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Binary Analysis, Disassembly, Decompilation, IDA Pro, Ghidra
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
171470
posts in
19.5
ms
LLM4CodeRE
: Generative AI for Code
Decompilation
Analysis and Reverse Engineering
🛡️
AI Security
arxiv.org
·
6d
Challenges in
Decompilation
and Reverse Engineering of CUDA
Kernels
[video]
🛡️
AI Security
youtube.com
·
4h
·
Hacker News
momenbasel/malware-check
: Enterprise-grade static and dynamic analysis tool for detecting malicious code, suspicious
binaries
, and privacy violations
📚
Technical Writing
github.com
·
1d
·
r/Malware
,
r/SideProject
,
r/opensource
Reverse engineering the Amazon
Blink
Gen3
outdoor camera
🛡️
AI Security
blog.adafruit.com
·
8h
Binary Heaven — Reverse Engineering Go
Binaries
,
ret2libc
Buffer Overflow, and PATH Hijack to Root…
🔒
Security
infosecwriteups.com
·
2d
Math
puzzle
: A
disassembly
job
🗂️
Zettelkasten
scientificamerican.com
·
12h
OpenAI Launches
GPT-5.4-Cyber
for Advanced
Reverse
Engineering
🛡️
AI Security
iclarified.com
·
53m
Reversing.Works
🌳
Git
reversing.works
·
3d
10 Claude Prompts for Faster
Debugging
(With
Examples
)
💉
SQL Injection
devprompts.gumroad.com
·
2d
·
DEV
Reverse
Engineering
Tuya
with AI
🛡️
AI Security
zach.codes
·
6h
·
Hacker News
Kiro
CLI 2.0: a new look and feel,
headless
CI/CD pipelines, and Windows support
🔧
DevOps
kiro.dev
·
23h
·
Hacker News
Linux
Admin
Training
📚
Technical Writing
jbosswiki.jboss.org
·
2h
·
r/linuxadmin
BSIM
explained
once and for all!
🔄
Concurrency
blog.quarkslab.com
·
1d
> *I like using it for
disassembling
UIKit
(for my day job working on iOS apps),...
📚
Technical Writing
news.ycombinator.com
·
6d
·
Hacker News
AI-Assisted
Hardware-in-the-Loop for
Embedded
Linux
🚀
CI/CD
electronicsconsult.com
·
2h
·
Hacker News
Binary
Ninja 5.3 (
Jotunheim
)
🐹
Golang
binary.ninja
·
1d
New
technique
lets researchers see inside running chips and explore
encryption
threats
🛡️
Cybersecurity
techspot.com
·
10h
Show HN: Answer 9 questions, get a Matter
firmware
with safe
boundaries
🔒
Security
anna.software
·
9h
·
Hacker News
IDA
Plugin
Updates on 2026-04-12
🐹
Golang
williballenthin.com
·
2d
The KIM-1
Programmer
’s Guide to the
MOS
6502
🐹
Golang
setsideb.com
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help