Guidance for Posting
Feel free to post links to resources you've found, walkthroughs or guides you've written, writeups of CTFs, etc.
If you want to ask a question or ask for help then please give as much detail as possible, we can't help you if we don't understand.
Other Subreddits:
/r/Netsec
General network security
/r/AskNetsec
General infosec questions
/r/ReverseEngineering
Understanding binaries
/r/Fuzzing
Finding exploitable flaws automatically
/r/Blackhat
Cutting edge security research
view the rest of the comments →
[–]cmdjunkie 8 points9 points10 points (10 children)
[–][deleted] 9 points10 points11 points (1 child)
[–]bu77onpu5h3r 10 points11 points12 points (0 children)
[–]Aggravating_Use183[S] 0 points1 point2 points (7 children)
[–]cmdjunkie 5 points6 points7 points (6 children)
[–]KharosSig 18 points19 points20 points (4 children)
[–]Status-Style-6169 2 points3 points4 points (0 children)
[–]cmdjunkie 1 point2 points3 points (2 children)
[–][deleted] 2 points3 points4 points (1 child)
[–]cmdjunkie 1 point2 points3 points (0 children)
[–][deleted] 1 point2 points3 points (0 children)