| Pretraživanje | Osvježi |
|
Abhisek Datta
@abh1sek
|
11. lis |
|
Fuzzing closed source applications using #WinAFL by @HackSysTeam @bsidesdelhi pic.twitter.com/PJQGwRIrS5
|
||
|
||
|
Aaron Imperial
@blackleitus
|
16. sij |
|
SG Input software security analysis fuzz
#offensivesecurity #cybersecurity #reverseengineering #vulnerability #windows #exploitdevelopment #softwaresecurity #winafl #fuzzing lnkd.in/eCxtiWc
|
||
|
|
||
|
expend
@expend20
|
20. pro |
|
Qt Gif parsing null deref rediscovered with #WinAFL
tw1st.link/2019/12/20/qt-…
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
11. pro |
|
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing
apriorit.com/dev-blog/640-q…
#winafl #fuzzing #vulnerability
|
||
|
|
||
|
expend
@expend20
|
6. stu |
|
A bit more info about fuzzing 3rd party image viewers for Windows #WinAFL #fuzzing #CVE apriorit.com/dev-blog/644-r…
|
||
|
|
||
|
expend
@expend20
|
10. lis |
|
Here is how I found several CVEs with #WinAFL
apriorit.com/dev-blog/640-q…
|
||
|
|
||
|
MicrosVuln
@microsvuln
|
19. ruj |
|
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU
github.com/andreafioraldi…
#winafl #win32fuzzing #fuzzing #AFL
|
||
|
|
||
|
expend
@expend20
|
27. kol |
|
Some bugs I've discovered recently with #WinAFL. It's in 3rd party image viewer on windows: ACDSsee, XnView, FastStone and I IrfanView. There are 20+ CVEids but It seems it's not so simple to build least one exploit on top of it github.com/apriorit/pente…
|
||
|
|
||
|
Hardik Shah (हार्दिक शाह)
@hardik05
|
15. lip |
|
added option to AFL_Runner.py to first run winafl with drrun.exe in debug mode to generate log.
github.com/hardik05/pytho… #winafl #fuzzing
|
||
|
|
||
|
Hardik Shah (हार्दिक शाह)
@hardik05
|
3. lip |
|
Releasing a quick and dirty script i coded, afl_runner.py . winafl takes lot of arguments and a user might make some mistake in passing parameters. with this script, you can configure different parameter once and then run it when you want.
github.com/hardik05/pytho…
#winafl #fuzzing
|
||
|
|
||
|
Hardik Shah (हार्दिक शाह)
@hardik05
|
20. tra |
|
The hardest part in fuzzing with #winafl is writing a harness. Rest win AFL will take care 😎
|
||
|
|
||
|
SocialandTech
@SocialandTech
|
26. velj |
|
Check Point Software Technologies: bug all'interno di WinRAR da 19 anni! - is.gd/ZfDikN #socialandtech #technews #bug #winrar #19anni #fuzztestingWinAFL #WinAFL #CheckPointSoftwareTechnologies pic.twitter.com/1V8NJF42V0
|
||
|
||
|
🔮WZor👁️
@WZorNET
|
22. velj |
|
😯Extracting a 19 Year Old Code Execution from #WinRAR -> research.checkpoint.com/extracting-cod…
👉In this article, we tell the story of how we found a logical bug using the #WinAFL fuzzer and exploited it in #WinRAR to gain full control over a victim’s computer. pic.twitter.com/HSIGurCJ2n
|
||
|
|
||
|
jfersec
@jfersec
|
20. velj |
|
*UNREGISTERED VERSION* aka 99% of winrar installs 🤣 #winrar #exploit lnkd.in/dV8TUXh #afl #winafl lnkd.in/djzQ7xu
|
||
|
|
||
|
CyberTeam
@CyberTeamClub
|
3. sij 2019. |
|
Tra il 2016 e il 2018 le vulnerabilità scoperte sono raddoppiate. Secondo uno studio di @_CPResearch_ ciò può essere dovuto alla crescente popolarità assunta dai "#Fuzzer". Interessante esperimento su #Adobe Reader. @CheckPointItaly bit.ly/2RaMVHJ
#WinAFL #CyberTeam
|
||
|
|
||
|
Fady Othman
@Fady_Othman
|
23. pro 2018. |
|
|
||
|
|
||
|
Francesco Bussoletti
@FBussoletti
|
19. pro 2018. |
|
53 new critical #AdobeReader vulnerabilities discovered thanks to #fuzzer. @CheckPoint #CyberSecurity experts performed a 50-day experiment with #WinAFL. Automatic vulnerability-finding tools use is increasing against #cyber threats difesaesicurezza.com/en/cyber-en/53… #infosec #cybercrime
|
||
|
|
||
|
Rob Pomeroy | CISSP | Solicitor
@robpomeroy
|
18. pro 2018. |
|
Interesting. WinAFL #fuzzer automation discovered 53 CVEs in Adobe Reader:
darkreading.com/threat-intelli…
#fuzzing #WinAFL #vulnerability #0day #adobereader
|
||
|
|
||
|
SecurityTrails
@securitytrails
|
16. pro 2018. |
|
Excellent research article on finding 50 Adobe Reader vulnerabilities in 50 days using using automatic vulnerability finding tools (also known as "fuzzers).
research.checkpoint.com/50-adobe-cves-…
#fuzzer #cve #WinAFL #adobe #adobereader
|
||
|
|
||
|
0xba3ba4
@0xba3ba4
|
12. pro 2018. |
|
Great research work relying on #WinAFL fuzzer. twitter.com/_CPResearch_/s…
|
||
|
|
||