๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Reverse Engineering

Disassembly, Binary Analysis, IDA Pro, Ghidra, Malware Analysis

MRI scans, X-rays and more leaked online in major breach - over a million healthcare devices affected, here's what we know
techradar.comยท5h
๐ŸŒBrowser Exploitation
Assemblers in w64devkit, and other updates
nullprogram.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Project Ire autonomously identifies malware at scale
microsoft.comยท6dยท
Discuss: Lobsters, Hacker News
๐Ÿ’ฅExploit Development
BUILD: Solving the Software Complexity Puzzle
computing.llnl.govยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Supply Chain Attacks
dev.toยท17hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Cloud Native Application and MSA
dev.toยท19hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
I canโ€™t live without these 5 obscure Linux apps
xda-developers.comยท1d
๐ŸŒBrowser Exploitation
CompTIA Labs: Bash Hello World, Linux File Management & Rapid Threat Detection
dev.toยท7hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
# Integrating Computer Vision into Smart Fence Control Software (A Practical, Developer-Friendly Guide)
dev.toยท5hยท
Discuss: DEV
๐Ÿ”’Security
Inspired by a recent OCR benchmark here, I'm building a tool to automate side-by-side model comparisons. Seeking feedback on the approach.
reddit.comยท22hยท
Discuss: r/LocalLLaMA
๐Ÿฆ€Rust
Dynamic Virtual Commissioning via Hybrid Agent-Based Simulation & Reinforcement Learning
dev.toยท7hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Report Reveals Tool Overload Driving Fatigue And Missed Threats In MSPs
hackernoon.comยท5h
๐Ÿ’ฅExploit Development
How we're shipping faster with Claude Code and Git Worktrees
incident.ioยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Vibe Coding - Conversational Software Development - Part 3 Prompt Discipline
dev.toยท9hยท
Discuss: DEV
๐Ÿฆ€Rust
Software Modernization Projects Dilemma (Part 1) โ€“ Should you do it?
medium.comยท1dยท
Discuss: Hacker News
๐Ÿฆ€Rust
Enhanced Membrane Distillation Optimization via Hybrid AI-Driven Process Modeling
dev.toยท2hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Who Gave the Toaster Root Access to the Physical World? (WHY2025)
cdn.media.ccc.deยท13h
๐ŸŒBrowser Exploitation
From Dots and Dashes to Modern Web: Building a Morse Code Translator That Developers Actually Want to Use
dev.toยท1dยท
Discuss: DEV
๐ŸŒBrowser Exploitation
Times when a project almost died in your heart, and what saved it
reddit.comยท4hยท
Discuss: r/roguelikedev
๐Ÿฆ€Rust
6 Lessons Learned: Focusing Security Where Business Value Lives
thehackernews.comยท13h
๐Ÿ’ฅExploit Development
Loading...Loading more...
AboutBlogChangelogRoadmap