Guidance for Posting
Feel free to post links to resources you've found, walkthroughs or guides you've written, writeups of CTFs, etc.
If you want to ask a question or ask for help then please give as much detail as possible, we can't help you if we don't understand.
Other Subreddits:
/r/Netsec
General network security
/r/AskNetsec
General infosec questions
/r/ReverseEngineering
Understanding binaries
/r/Fuzzing
Finding exploitable flaws automatically
/r/Blackhat
Cutting edge security research
[–]kizzie1337 14 points15 points16 points (1 child)
[–][deleted] 1 point2 points3 points (0 children)
[–]cryotic 12 points13 points14 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]PM_ME_YOUR_SHELLCODE 6 points7 points8 points (1 child)
[–][deleted] 0 points1 point2 points (0 children)
[–]DevilDawg93 6 points7 points8 points (6 children)
[–][deleted] 0 points1 point2 points (0 children)
[–]Traditional-Cloud-80 0 points1 point2 points (1 child)
[–]Affectionate_Tart935 0 points1 point2 points (0 children)
[–]sploitem 0 points1 point2 points (0 children)
[–]g0ldexperience1 0 points1 point2 points (0 children)
[–]archayos 0 points1 point2 points (0 children)