Twitter | Pretraživanje | |
Pretraživanje Osvježi
SAFECode 9 min
We are talking this February on the blog. Learn more about why you should consider fuzz in our first 'Focus on Fuzzing' blog post
Reply Retweet Označi sa "sviđa mi se"
5BC 9 h
What an honor, 2 of our best giving an awesome talk about at the amazing conference
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 23 h
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 5 h
Want to reverse module? Analyze cryptominer? WebAssembly VMs? ➡️ Reversing & Fuzzing ⏲️ 3-Days 🇳🇱Amsterdam at 🗓️ 20 -22 April 2020 ⬇️ Detailed outline ⬇️
Reply Retweet Označi sa "sviđa mi se"
◾ 5. velj
Excelent methodology and so well explain
Reply Retweet Označi sa "sviđa mi se"
ForAllSecure 4. velj
Calling C/C++ developers! Are you familiar with ? Want to learn more? Join us and software security leaders on Feb 25 for
Reply Retweet Označi sa "sviđa mi se"
ringzerø.training 4. velj
Interested in... exploitation? exploitation? analysis? security? ? exploitation? ? ? exploitation? ? exploitation? ? Attend 2020 👉
Reply Retweet Označi sa "sviđa mi se"
Linux Security Labs 4. velj
Tool review: SFTPfuzzer (FTP fuzzing tool)
Reply Retweet Označi sa "sviđa mi se"
SAFECode 3. velj
February’s focus is ! Follow the blog this month to learn more about why and how to add this often underutilized testing method to your program. Get started here
Reply Retweet Označi sa "sviđa mi se"
Linux Security Labs 3. velj
Tool review: Wfuzz (web application fuzzer) by
Reply Retweet Označi sa "sviđa mi se"
Dhiraj 1. velj
Odgovor korisniku/ci @RandomDhiraj
Recent work, vim -e -s -c 'exe "norm /\x80PS"'
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
Fuzzing npm/nodejs WebAssembly parsing library with jsfuzz
Reply Retweet Označi sa "sviđa mi se"
Arif Z 1. velj
How To Install and Use Radamsa to Fuzz Test Programs and Network Services on Ubuntu 18.04
Reply Retweet Označi sa "sviđa mi se"
zenrud 31. sij
Fuzzing vs. Property Testing
Reply Retweet Označi sa "sviđa mi se"
catenacyber 31. sij
binutils (objdump, gdb, etc..) and sharing oss-fuzz bounty with to support these tools :
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 31. sij
American Fuzzy Lop plus plus (afl++): afl++ is afl 2.56b with community patches, AFLfast power schedules, qemu 3.1 upgrade + laf-intel support, MOpt mutators, InsTrim instrumentation, unicorn_mode and a lot more!
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 30. sij
🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM
Reply Retweet Označi sa "sviđa mi se"
Franz Dill 30. sij
Fuzzing for Testing Security Vulnerabilities
Reply Retweet Označi sa "sviđa mi se"
Thuan Pham 30. sij
My take-away from recent review article paper of P. Godefroid -- 3 (of N) open challenges in 1) how to engineer exhaustive symbolic testing in a cost-effective manner, 2) how to automate the generation of input grammars, and 3) how to effectively fuzz distributed apps
Reply Retweet Označi sa "sviđa mi se"
ForAllSecure 29. sij
What emerging cyber trends will have the most impact in the 2020s? “Highly scalable automated vuln discovery”, says JD Work of the Marine Corps Academy. He points to the and resources of Google Project Zero via
Reply Retweet Označi sa "sviđa mi se"