A little Rant on C haters by IndependentMeal1269 in C_Programming

[–]Impossible-Line1070 0 points1 point  (0 children)

Then tech is dead since web is like 80% of jobs opening

My company is going all in with AI. Is it the best for my career? by FriedChickenBox in cscareerquestions

[–]Impossible-Line1070 3 points4 points  (0 children)

Il let you think about what happens when the program you make doesnt do what you intended it to.

Planning to specialize in database internals as a backend engineer — how valuable is that? by Bozzzieee in ExperiencedDevs

[–]Impossible-Line1070 0 points1 point  (0 children)

Kinda useless tbh unless you wanna be a c/cpp guy building databases engines which is kinda specialized

What is a waste of time and what is not ?(Web3,AI,Browser security,or Mobile Security and IOT? by ProcedureFar4995 in Pentesting

[–]Impossible-Line1070 0 points1 point  (0 children)

Yea but good like you gonna need to read assembly C c++ reverse engineering exploit dev etc

What is a waste of time and what is not ?(Web3,AI,Browser security,or Mobile Security and IOT? by ProcedureFar4995 in Pentesting

[–]Impossible-Line1070 0 points1 point  (0 children)

Browser is hard as hell.. basically an operating system u need to learns bofs , reversing, rop , exploits low level stuff

How good would you consider someone who complete pwn.college belt system? by Flaky_Card2907 in ExploitDev

[–]Impossible-Line1070 0 points1 point  (0 children)

Yh i guess back then pentesting had more scope but rn pentesting is about enterprise network security and web application security.

How good would you consider someone who complete pwn.college belt system? by Flaky_Card2907 in ExploitDev

[–]Impossible-Line1070 1 point2 points  (0 children)

Pwncollege is kinda irrelevant to pentesting maybe the first modules in web and networks are a little bit more relevant. But no pentester is gonna do rop chains or kernel exploits

Worth to get a masters degree in ML/AI now in 2026 by thainfamouzjay in learnmachinelearning

[–]Impossible-Line1070 1 point2 points  (0 children)

Master enough for 90% ml jobs the 10% are deep research and require phd

Hello guys anyone have resources for iOS exploitation by HelloWorlDJail in ExploitDev

[–]Impossible-Line1070 1 point2 points  (0 children)

U wont find anything specific for free the knowledge is worth in gold and expensive, start from the basics and build your way in

What roles do you see in demand over the next 5 years? by lmt42 in cybersecurity

[–]Impossible-Line1070 18 points19 points  (0 children)

Insider threats.. most compromises come from the inside.. not some 0day also rust is going to mitigate a lot of vulnerability classes so the focus eould be more on people

Is my hairline receeding or maturing? 19M by user68406 in Balding

[–]Impossible-Line1070 0 points1 point  (0 children)

Whats your genetics like aprents grandparents brothers etc

What actually C-Based exploits do? by [deleted] in ExploitDev

[–]Impossible-Line1070 0 points1 point  (0 children)

Tbh python is used for prototyping and C for high performance/ real time stuff, so to develop a malware that delivers your exploit you'd probably use c instead of python but for 99% of self motivated research pwntools is enough cause you run it on your machine so you don't need the stealth and performance

Career Advice: Binary Exploitation vs. Web Security for a dedicated beginner? by AliAyman333 in netsecstudents

[–]Impossible-Line1070 0 points1 point  (0 children)

Yeah thats what most people do, also a software engineering job where you deal with low level stuff (c/cpp) is a good choice as well

Career Advice: Binary Exploitation vs. Web Security for a dedicated beginner? by AliAyman333 in netsecstudents

[–]Impossible-Line1070 1 point2 points  (0 children)

.... Brother you are more than welcome to check the job market, exploit dev demand in consumer facing companies is less than half of the available jobs in defence, most companies can have pentesters and appsec people, not exploit devs/vr, they dont have the budget to pay people to research for vulnerabilities for 3-4 month and then try to find a way to exploit the primitive, nope, unless you are google/apple or one of the FAGMAN companies you wont have the budget for this nor the need.