Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Disassembly, Binary Analysis, IDA Pro, Ghidra, Malware Analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81310
posts in
538.4
ms
learning by
reverse
engineering
clymup.com
·
1d
💥
Exploit Development
How I Approach a System I Have Never Seen Before
dev.to
·
5h
·
Discuss:
DEV
🦀
Rust
Uncovering
Hidden
Informations
whiteravendev.itch.io
·
19h
💥
Exploit Development
OpenClaw
integrates
VirusTotal
malware scanning as security firms flag enterprise risks
csoonline.com
·
2h
🌐
Browser Exploitation
SVRepair
:
Structured
Visual Reasoning for Automated Program Repair
arxiv.org
·
9h
🦀
Rust
Using Claude Code as a general agent
raahelbaig.com
·
2h
·
Discuss:
Hacker News
🦀
Rust
Reverse Engineering the
Prom
for the
SGI
O2
mattst88.com
·
15h
·
Discuss:
Lobsters
,
Hacker News
💥
Exploit Development
Desk of
Ladyada
– OpenClaw,
eInk
Hacking & Vibe-Coding an Oscilloscope
blog.adafruit.com
·
15h
🌐
Browser Exploitation
Choosing
the Right Strategy: Cold Boot
Forensics
vs Live System Analysis
blog.elcomsoft.com
·
2h
💥
Exploit Development
Main
Content ||
Math
∩ Programming
jeremykun.com
·
15h
🦀
Rust
Learn
Weird
Programming
Languages
okienko.day
·
58m
·
Discuss:
Hacker News
🦀
Rust
How Analysts Translate Messy Data,
DAX
, and
Dashboards
into Action Using Power BI
pragmaticinstitute.com
·
17m
·
Discuss:
DEV
💥
Exploit Development
Power
Automate
powerdevbox.com
·
7h
·
Discuss:
DEV
🦀
Rust
ALW1EZ/PANO
: 🔍
PANO
: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connections in data. Built with Python and modern Qt.
github.com
·
1d
🌐
Browser Exploitation
How
StrongDM
’s AI team build
serious
software without even looking at the code
jmason.ie
·
3h
💥
Exploit Development
Identifying
Adversary
Tactics and Techniques in Malware
Binaries
with an LLM Agent
arxiv.org
·
9h
💥
Exploit Development
Backup
restoration
and migration
lemmy.world
·
3h
🦀
Rust
China-Linked
DKnife
Spyware
Hijacking
Internet Routers Since 2019
hackread.com
·
3h
🌐
Browser Exploitation
DNS
SRV
Records to the Rescue
blog.wirelessmoves.com
·
2h
💥
Exploit Development
Software Engineering with AI: Beyond
Vibe-Coding
principalengineer.com
·
23h
🔬
Static Analysis
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help