Twitter | Pretraživanje | |
Pretraživanje Osvježi
MicrosVuln 29. sij
Fuzzing software: common challenges and potential solutions (Part 1)
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 30. sij
🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
Fuzzing npm/nodejs WebAssembly parsing library with jsfuzz
Reply Retweet Označi sa "sviđa mi se"
IoT-PT 2 h
Released version1 OS for IoT devices pentesting Plan for : V2 making packaging tools and script to install in your own virtual box image
Reply Retweet Označi sa "sviđa mi se"
Linux Security Labs 2 h
Tool review: Wfuzz (web application fuzzer) by
Reply Retweet Označi sa "sviđa mi se"
omvapt 24 h
Reply Retweet Označi sa "sviđa mi se"
Dhiraj 1. velj
Odgovor korisniku/ci @RandomDhiraj
Recent work, vim -e -s -c 'exe "norm /\x80PS"'
Reply Retweet Označi sa "sviđa mi se"
Arif Z 1. velj
How To Install and Use Radamsa to Fuzz Test Programs and Network Services on Ubuntu 18.04
Reply Retweet Označi sa "sviđa mi se"
zenrud 31. sij
Fuzzing vs. Property Testing
Reply Retweet Označi sa "sviđa mi se"
catenacyber 31. sij
binutils (objdump, gdb, etc..) and sharing oss-fuzz bounty with to support these tools :
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 31. sij
American Fuzzy Lop plus plus (afl++): afl++ is afl 2.56b with community patches, AFLfast power schedules, qemu 3.1 upgrade + laf-intel support, MOpt mutators, InsTrim instrumentation, unicorn_mode and a lot more!
Reply Retweet Označi sa "sviđa mi se"
Franz Dill 30. sij
Fuzzing for Testing Security Vulnerabilities
Reply Retweet Označi sa "sviđa mi se"
Thuan Pham 30. sij
My take-away from recent review article paper of P. Godefroid -- 3 (of N) open challenges in 1) how to engineer exhaustive symbolic testing in a cost-effective manner, 2) how to automate the generation of input grammars, and 3) how to effectively fuzz distributed apps
Reply Retweet Označi sa "sviđa mi se"
ForAllSecure 29. sij
What emerging cyber trends will have the most impact in the 2020s? “Highly scalable automated vuln discovery”, says JD Work of the Marine Corps Academy. He points to the and resources of Google Project Zero via
Reply Retweet Označi sa "sviđa mi se"
movaxbx 29. sij
Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)
Reply Retweet Označi sa "sviđa mi se"
Evgeny Belenky 28. sij
If you need to learn how to do , here's a collection of tutorials on different fuzzers
Reply Retweet Označi sa "sviđa mi se"
Foluwa T. Rewane 28. sij
What is ? It is a testing approach that consists of feeding large amounts of random inputs to the target program in an attempt to reveal bugs. It can be thought of as starting with something clear such as a valid application file, and “fuzzing” or “blurring” pieces of it.
Reply Retweet Označi sa "sviđa mi se"
catenacyber 28. sij
More patches for to fix vulnerabilities found by by students :
Reply Retweet Označi sa "sviđa mi se"
Júnior 27. sij
Reply Retweet Označi sa "sviđa mi se"
Code Intelligence 27. sij
Read Sergej Dechands newest interview on how to benefit from the advantages of . Read the full article
Reply Retweet Označi sa "sviđa mi se"