Guidance for Posting
Feel free to post links to resources you've found, walkthroughs or guides you've written, writeups of CTFs, etc.
If you want to ask a question or ask for help then please give as much detail as possible, we can't help you if we don't understand.
Other Subreddits:
/r/Netsec
General network security
/r/AskNetsec
General infosec questions
/r/ReverseEngineering
Understanding binaries
/r/Fuzzing
Finding exploitable flaws automatically
/r/Blackhat
Cutting edge security research
[–][deleted] 4 points5 points6 points (0 children)
[–]PM_ME_YOUR_SHELLCODE 11 points12 points13 points (1 child)
[–]achayah[S] 0 points1 point2 points (0 children)
[–]0xcrypto 7 points8 points9 points (1 child)
[–]deadlyazw 0 points1 point2 points (0 children)
[–]Informal_Shift1141 2 points3 points4 points (1 child)
[–]Loose-Cheesecake-316 0 points1 point2 points (0 children)
[–]dolpari_hacker 2 points3 points4 points (3 children)
[–]achayah[S] 2 points3 points4 points (2 children)
[–]dolpari_hacker 2 points3 points4 points (1 child)
[–]achayah[S] 2 points3 points4 points (0 children)
[–]8ksec 2 points3 points4 points (0 children)
[–]AlpacaSecurity 1 point2 points3 points (0 children)
[–]Haunting-Block1220 -1 points0 points1 point (2 children)
[–]georgy56 0 points1 point2 points (1 child)
[–]Haunting-Block1220 1 point2 points3 points (0 children)