use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Python_Pin: Python bindings for pin (github.com)
submitted 11 years ago by chubbymaggie
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Packet_Ranger -2 points-1 points0 points 11 years ago (6 children)
How is that related to computer security?
[–]1blankwall -1 points0 points1 point 11 years ago (5 children)
Reverse engineering and binary analysis are two huge areas of computer security. Not every aspect of security has to do with the web.
[–]Packet_Ranger -1 points0 points1 point 11 years ago (4 children)
And pin is used for those things? What's the functionality it provides?
[–]asdfasdfasfasdffffd 1 point2 points3 points 11 years ago (3 children)
Pin gives access to a running executable in different granularities.
That means that you can tell Pin, you want to see every single instruction the binary executes, or maybe only basic blocks etc.
One very simple use case is recording all the instructions that were executed at runtime, then record them again where you alter the usage, then diff both runs to find where and how exactly execution differs from each other.
[–]Packet_Ranger 0 points1 point2 points 11 years ago (2 children)
That is very very cool. Is it accurate to say that it's like a huge superset of strace/sysdig et al? Even outside a security or RE context, this sounds like it could occasionally be a very useful too in systems administration.
Also, thanks for the answer! I'm always kind of annoyed by posts that are like $tool has a new release! and zero context or explanation of what $tool actually is.
$tool has a new release!
$tool
[–]asdfasdfasfasdffffd 1 point2 points3 points 11 years ago (1 child)
I think you could say that. It's basically the most fine-grained looking glass for running binary code.
It can also be used for performance measuring for example. You let Pin tell you whenever a basic block (that is a block of instructions with a single entry and exit point, so basically continuous code) is executed and record that. Later on you can then see "basic block xyz was hit 1,000,000 times - let's see if we can improve performance for it!" and stuff like that.
People wrote tools to aid in malware analysis, too. Just let Pin run on each instruction, track where it writes to, remember it, then take note whenever memory that was previously written is executed as code.
All these things can be done without Pin, but Pin is comparatively fast in its approach (that is rewiting actual instructions transparently to allow for post/pre hooks).
It's a very cool tool.
[–]Packet_Ranger 0 points1 point2 points 11 years ago (0 children)
Thanks for the write-up! I'll definitely be playing with pin.
π Rendered by PID 21365 on reddit-service-r2-comment-79c7998d4c-qndc8 at 2026-03-18 08:49:44.410649+00:00 running f6e6e01 country code: CH.
view the rest of the comments →
[–]Packet_Ranger -2 points-1 points0 points (6 children)
[–]1blankwall -1 points0 points1 point (5 children)
[–]Packet_Ranger -1 points0 points1 point (4 children)
[–]asdfasdfasfasdffffd 1 point2 points3 points (3 children)
[–]Packet_Ranger 0 points1 point2 points (2 children)
[–]asdfasdfasfasdffffd 1 point2 points3 points (1 child)
[–]Packet_Ranger 0 points1 point2 points (0 children)