RE: Writing your Own Exploits as a PentesterYou are viewing a single comment's thread from:Writing your Own Exploits as a PentesterView the full contextView the direct parentace108 (76) in cybersecurity • 5 years ago you're welcome. cybersecurity