Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Reverse Engineering
Disassembly, Binary Analysis, IDA Pro, Ghidra, Malware Analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112122
posts in
613.1
ms
Computer
Forensic
Tools Comparison
Chart
2026
cybertriage.com
·
1d
🌐
Browser Exploitation
Application
Security
dev.to
·
31m
·
Discuss:
DEV
🔒
Security
How a Small
OSINT
Team Turned the Epstein Files Dump Into
Actionable
Intelligence
hackernoon.com
·
5h
🌐
Browser Exploitation
CryptoAnalystBench
:
Failures
in Multi-Tool Long-Form LLM Analysis
arxiv.org
·
5h
💥
Exploit Development
Et Tu, Default
Creds
? Introducing
Brutus
for Modern Credential Testing
praetorian.com
·
9h
💥
Exploit Development
When
auditing
any software system, it’s
important
to...
lmika.org
·
13h
🔬
Static Analysis
Is "
Knowing
How to Code" Enough? My 1-Year Experiment in
Forensic
Engineering.
dev.to
·
19h
·
Discuss:
DEV
💥
Exploit Development
DaltonCalford/ScratchBird
: Originally a refactor of the FirebirdSQL database - The GPRE and other legacy code and procedures kept breaking when AI tried to "HELP" so
ScratchBird
is a full rewrite, using Firebird as a specification
github.com
·
32m
·
Discuss:
Hacker News
🦀
Rust
A
Conceptual
Framework for Exploration
Hacking
lesswrong.com
·
18h
💥
Exploit Development
Davinci
Resolve
Studio
sourceforge.net
·
17h
·
Discuss:
r/archlinux
🌐
Browser Exploitation
I Let AI
Pentest
my lab for 45 Minutes.
HexStrike
AI and KALI MCP to get a shell after only 20.
infosecwriteups.com
·
1d
💥
Exploit Development
Endpoint
Inspector
: Precision Data Collection For The Real World
forensicfocus.com
·
19h
🦀
Rust
Teensy
Stereo Audio
Recorder
hackster.io
·
13h
🔒
Security
Bringing a
jewel-encrusted
warhammer to a knife fight
reorchestrate.com
·
1d
·
Discuss:
Hacker News
,
r/rust
🦀
Rust
Jailbreaking
Leaves a
Trace
: Understanding and Detecting Jailbreak Attacks from Internal Representations of Large Language Models
arxiv.org
·
5h
💥
Exploit Development
WhatsApp
Deploys
Rust-Based Media
Parser
to Block Malware on 3 Billion Devices
infoq.com
·
1d
🌐
Browser Exploitation
Linkdump
No 94
82mhz.net
·
10h
🌐
Browser Exploitation
Introducing
AutoDiscovery
: Automated scientific discovery, now in
AstaLabs
allenai.org
·
18h
🦀
Rust
Programming
languages
mothcodes.bearblog.dev
·
32m
⚙
C++
The
Redundancy
Paradox
mihirdeshpande.com
·
17h
·
Discuss:
Hacker News
🦀
Rust
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help