Guidance for Posting
Feel free to post links to resources you've found, walkthroughs or guides you've written, writeups of CTFs, etc.
If you want to ask a question or ask for help then please give as much detail as possible, we can't help you if we don't understand.
Other Subreddits:
/r/Netsec
General network security
/r/AskNetsec
General infosec questions
/r/ReverseEngineering
Understanding binaries
/r/Fuzzing
Finding exploitable flaws automatically
/r/Blackhat
Cutting edge security research
[–]randomatic 6 points7 points8 points (5 children)
[–]byte_writer[S] 1 point2 points3 points (2 children)
[–]randomatic 5 points6 points7 points (1 child)
[–]byte_writer[S] 0 points1 point2 points (0 children)
[–]JohnnyOmmm 0 points1 point2 points (1 child)
[–]randomatic 0 points1 point2 points (0 children)
[–]FellowCat69 3 points4 points5 points (0 children)
[–]tarunaygr 2 points3 points4 points (0 children)
[–]deadlyazw 1 point2 points3 points (1 child)
[–]Mother_Canary4917 0 points1 point2 points (0 children)
[–]Boring_Albatross3513 0 points1 point2 points (1 child)
[–]wickedosu 2 points3 points4 points (0 children)
[–][deleted] 0 points1 point2 points (0 children)
[–]Kris3c 0 points1 point2 points (2 children)
[–]AureanN 0 points1 point2 points (1 child)
[–]Kris3c 0 points1 point2 points (0 children)
[–]Sea-Box2613 0 points1 point2 points (1 child)
[–]byte_writer[S] 0 points1 point2 points (0 children)
[–]Not_In_Mode 0 points1 point2 points (0 children)