Transform your career by learning how hacking really works

Stop leaning on Metasploit and Nessus. Understand how exploits actually work, and how to stop them.

Hands-on Courses • Active Community • Hacking Challenges

Join now and get instant access to our FREE Hacking Challenge

Meet Your Instructor

Ed (Low Level)

Ed, also known as Low Level, is a low level programmer, security engineer, and software security researcher with over 10 years of experience. On YouTube, he has over 1,000,000 subscribers where he teaches the internet how to harness the lowest levels of computing.

Here on StackSmash, he'll teach you the fundamentals to understand how real-world exploits work (and how to stop them).

Available Courses

Master the skills you need to become a software security expert. Each course is designed to take you from beginner to advanced.

Getting Started
Getting Started
Introduction to the community and the challenge range. Get your first taste of what it's like to be part of the StackSmash community.
Computer Fundamentals
Computer Fundamentals
Learn the fundamentals of computers and software security. What is a bug? What is a vulnerability? How do computers work?
C Programming
C Programming
Learn the fundamentals of C programming from a security perspective. Learn how to program in C and how to use it to build exploits.
Python Programming
Python Programming
Learn the fundamentals of Python programming for exploit development.
Memory Corruption 101
Memory Corruption 101
We wrote some C, now lets break it. What can go wrong in a C program? What are the primitives that enable memory corruption?
x86 Assembly
x86 Assembly
Learn the fundamentals of x86 assembly programming. How does the CPU execute instructions? How do we write code that runs on the CPU?
Reverse Engineering
Reverse Engineering
Code gets compiled, so how can we read the code? In this course we cover how to take apart a binary and make good assumptions about how they work.
Memory Corruption 102
Memory Corruption 102
We learned about primitives, now what about mitigations? How do ASLR, RELRO, PIE and NX work, and how can they be byassed?
AND MORE!
AND MORE!
Courses are being added. Stay tuned for updates.

Ready For More?

Active Community

Active Community

Join a group of peers that are trying to accomplish the same goal as you, helping along the way.

Hacking Courses

Hacking Courses

Learn low level computing, how to program in C, write exploits in Python, reverse engineer software, and fuzz software.

CTF Challenges

CTF Challenges

Compete in CTF Challenges with the community to gain experience and level up your skills.

A Career Roadmap
Every essential skill you need to know for landing a job in cybersecurity down to what to put on your resume.
Hands-on Tutorials
Learn low level computing, how to program in C, write exploits in Python, reverse engineer software, fuzz, and analyze malware.
Active Community
Join a tribe of peers that are trying to accomplish the exact same goal as you, helping along the way.
Coaching Calls
Weekly coaching calls by Low Level and guest hosts will tell you exactly how to get unstuck and keep learning.
CTF Challenges
Compete in real world CTF Challenges with the community to gain experience and level up your skills.
Career Opportunities
Exclusive job postings, referrals, and networking opportunities with top security firms and tech companies.

What Members Are Saying

LIVE

Weekly Office Hours

Get your questions answered in real-time during our weekly Q&A sessions

Weekly Q&A Sessions

Join us every week for live Q&A calls where you can ask questions, get help with challenges, and learn from the community.

Direct Access to Experts

Get personalized guidance from experienced security professionals who understand your journey and can help you overcome obstacles.

Community Learning

Learn from questions others are asking. Every session is an opportunity to discover new techniques and perspectives.

Office Hours Q&A Session

Learning is easier with a community

Maybe this is you:

There have been dozens of times during my hacking journey where I've been stuck, trying to figure out a complicated concept.

Eventually a little lightbulb goes off and 'oh, I get it now!'

Every one of these moments can be accelerated with a community

Every one of those moments makes you a better security professional

Frequently Asked Questions

Everything you need to know about StackSmash

Ready to Get Started?

Join the premiere community for hackers learning software security. Stop watching from the sidelines. Start building your future today.

✓ Cancel anytime • ✓ Instant access