u/WillingAardvark647

what would be a good way to get into exploiting (image unrelated)

note that this MIGHT be a violation of rule 10

a couple things to take note of:

1: have common sense and DON'T tell me to use something that's known for being malicious or is just terrible.

2: at the VERY least be nice.

executors with key systems are a bit of a mixed bag but whatever

reddit.com
u/WillingAardvark647 — 3 days ago