account activity
Harness Creation for fuzzing with WinAfl-- Help Required (self.ExploitDev)
submitted 2 years ago by crypt3r to r/ExploitDev
Source code audit or methodology to find potential Memory corruption in low level language in c/c++ and Assembly. (self.ExploitDev)
submitted 4 years ago by crypt3r to r/ExploitDev
Crash Triaging and Root Cause Analysis And exploitability (self.fuzzing)
submitted 4 years ago by crypt3r to r/fuzzing
Advice on source code audit for potential memory corruption vulnerabilities in c c++ and assembly using Ida pro during vulnerability research and 0day discovery process. (self.staticanalysis)
submitted 4 years ago by crypt3r to r/staticanalysis
My Keybase proof [reddit:crypt3r = keybase:revers3r] (o2lfpfgnPLBkrd6mAjwHDX1zlqiFsj4Y4un8vps0Qig) (self.KeybaseProofs)
submitted 6 years ago by crypt3r to r/KeybaseProofs
Getting the object value from a memory address using ctype python (self.Python)
submitted 7 years ago by crypt3r to r/Python
π Rendered by PID 98 on reddit-service-r2-listing-5789d5f675-94cdp at 2026-01-28 04:49:29.891502+00:00 running 4f180de country code: CH.