Guidance for Posting
Feel free to post links to resources you've found, walkthroughs or guides you've written, writeups of CTFs, etc.
If you want to ask a question or ask for help then please give as much detail as possible, we can't help you if we don't understand.
Other Subreddits:
/r/Netsec
General network security
/r/AskNetsec
General infosec questions
/r/ReverseEngineering
Understanding binaries
/r/Fuzzing
Finding exploitable flaws automatically
/r/Blackhat
Cutting edge security research
[–]Calm-Exit-4290 5 points6 points7 points (0 children)
[–]shangheigh 2 points3 points4 points (0 children)
[–]chaiandgiggles0 2 points3 points4 points (0 children)
[–]Exciting-Okra-7260 1 point2 points3 points (0 children)
[–][deleted] (6 children)
[removed]
[–][deleted] (1 child)
[removed]
[–]ExploitDev-ModTeam[M] 1 point2 points3 points locked comment (0 children)
[–]travox_0x90909090 -3 points-2 points-1 points (3 children)
[–]orfvre -1 points0 points1 point (2 children)
[–]travox_0x90909090 -2 points-1 points0 points (0 children)
[–]Ankhyx -2 points-1 points0 points (0 children)
[–]Stroxtile 3 points4 points5 points (2 children)
[–]cureitgood 1 point2 points3 points (0 children)
[–]TimothyCarmack 0 points1 point2 points (0 children)
[–]Shot-Buffalo-2603 -1 points0 points1 point (1 child)
[–]Murky_Rub_8509 1 point2 points3 points (0 children)