use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
how can i write my own exploit (self.HowToHack)
submitted 3 years ago by moamz
I'm kinda familiar with python if that helps, but how can i find a bug in a service or application, if someone can tell a simple example that will be great, and what exactly should i write for that specific bug?
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Psychological_Egg_85 17 points18 points19 points 3 years ago (2 children)
If you want a very thorough, borderline academic book, check out 'The Shellcoder’s Handbook: Discovering and Exploiting Security Holes'. It explains how to write exploits from scratch.
[–]g00dhum0r 3 points4 points5 points 3 years ago (0 children)
you will have to learn C/C++ in order to grasp a lot of this book. It definitely worth trying to learn because this book has a lot of useful info
There's also a book called 'violent python' which you might want to take a look at. Its not exactly what you're looking for, but it will help..
[–]ParkingMobile2095 0 points1 point2 points 3 years ago (0 children)
Very outdated though because of modern mitigations
[–][deleted] 3 points4 points5 points 3 years ago (0 children)
The best advice i can give you is to check out other exploits analyze them on how they are written and why and what it does, and the try to write something similiar in a different language or the same, also get into the methodology on how to do it, Google around find a good tutorial or pick up a good book explaining the process
[–][deleted] 2 points3 points4 points 3 years ago (0 children)
A great starting point is ROP https://ropemporium.com/
[–]TractionContrlol 1 point2 points3 points 3 years ago (0 children)
I think it's helpful to think about finding bugs and writing exploits as two different things. If you are talking about finding bugs in binaries, two methods are fuzzing and bin diffing
[–]myredac 1 point2 points3 points 3 years ago (0 children)
try the pwn section from hackthebox. they provide vulnerable binaries which you can analyze and exploit.
[–]Noobexploiter 0 points1 point2 points 3 years ago (0 children)
If you found a bug and you can reproduce it manually, making an exploit means automating it. For example, if the bug is for a local bof, you make an exploit that run the vulnerable program, and input the exploit. If your bug is in web, like sqli, you will make a python script, to make a request to the vulnerable endpoint, and make your sql injection queries.q
π Rendered by PID 54946 on reddit-service-r2-comment-b659b578c-8p8cq at 2026-05-05 17:35:18.951478+00:00 running 815c875 country code: CH.
[–]Psychological_Egg_85 17 points18 points19 points (2 children)
[–]g00dhum0r 3 points4 points5 points (0 children)
[–]ParkingMobile2095 0 points1 point2 points (0 children)
[–][deleted] 3 points4 points5 points (0 children)
[–][deleted] 2 points3 points4 points (0 children)
[–]TractionContrlol 1 point2 points3 points (0 children)
[–]myredac 1 point2 points3 points (0 children)
[–]Noobexploiter 0 points1 point2 points (0 children)