๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Reverse Engineering

Disassembly, Binary Analysis, IDA Pro, Ghidra, Malware Analysis

DVD RipR 3.2.2.20
giveawayoftheday.comยท18h
๐ŸŒBrowser Exploitation
MetaScope 1.0 Revolutionizes Comprehensive Metadata Management
zalodesignstudio.comยท6hยท
Discuss: Hacker News
๐Ÿฆ€Rust
A short statistical reasoning test
emiruz.comยท2dยท
Discuss: Lobsters, Hacker News
๐Ÿ›Fuzzing
From the AI Summit Stage to the Show Floor: Black Hat 2025 Takeaways on the AI SOC Frontier
intezer.comยท14h
๐Ÿ’ฅExploit Development
WAF - WAF Release - 2025-08-18
developers.cloudflare.comยท1d
๐Ÿ’ฅExploit Development
CleanCTG: A Deep Learning Model for Multi-Artefact Detection and Reconstruction in Cardiotocography
arxiv.orgยท22h
๐Ÿ’ฅExploit Development
https://blog.wilsonl.in/search-engine/?s=09
blog.wilsonl.inยท1d
๐Ÿ›Fuzzing
Top 4 Noโ€‘Code AI Platforms for Building Apps and Websites Without Code
smallbiztrends.comยท3h
๐ŸŒBrowser Exploitation
AI Daily News Aug 18 2025: New brain chip decodes inner thoughts in real time; Nearly 90% of game developers now use AI; Altman details OpenAI's trillion-dollar...
reddit.comยท3hยท
Discuss: r/LLM
๐ŸŒBrowser Exploitation
CrossTrace: Efficient Cross-Thread and Cross-Service Span Correlation in Distributed Tracing for Microservices
arxiv.orgยท22h
๐Ÿฆ€Rust
Navigating the Future of Artificial Intelligence
ai4.ioยท1dยท
Discuss: DEV
๐Ÿฆ€Rust
This Overlooked Issue Is Slowing Down Your Windows PC: Here's What I Did
makeuseof.comยท6h
๐ŸŒBrowser Exploitation
Recovery APP for wrongly formatted HDD.
forums.anandtech.comยท20h
๐ŸŒBrowser Exploitation
Spent many hours finding an alternative to Milestone Xprotect, and found Frigate
reddit.comยท1dยท
Discuss: r/selfhosted
๐ŸŒBrowser Exploitation
LoRAtorio: An intrinsic approach to LoRA Skill Composition
arxiv.orgยท22h
๐Ÿ”ฌStatic Analysis
Scalable Adaptive Exploration via Hierarchical Soft Actor-Critic with Dynamic Curriculum Learning
dev.toยท23hยท
Discuss: DEV
๐Ÿ’ฅExploit Development
Interactive micro:bit RC Kart
hackster.ioยท2d
๐ŸŒBrowser Exploitation
Abusing AI infrastructure: How mismanaged credentials and resources expose LLM applications
datadoghq.comยท1d
๐Ÿ’ฅExploit Development
Building InboxHiiv: Event-Driven Podcast Processing with Firebase Functions and Gemini AI
dev.toยท3hยท
Discuss: DEV
๐Ÿฆ€Rust
Elegant Middleware Architecture Implementation(6302)
dev.toยท1dยท
Discuss: DEV
๐Ÿฆ€Rust
Loading...Loading more...
AboutBlogChangelogRoadmap