FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques.
http://arxiv.org/abs/2102.02527
https://twitter.com/arxiv_org/status/1357999368788271105
http://arxiv.org/abs/2102.02527
https://twitter.com/arxiv_org/status/1357999368788271105
Twitter
arxiv
FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques. https://t.co/zEOhlaw592
ImHex - Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM.
https://github.com/WerWolv/ImHex
https://github.com/WerWolv/ImHex
GitHub
GitHub - WerWolv/ImHex: 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3…
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. - WerWolv/ImHex
Learn how to take aim at HTTP attack surfaces in https://twitter.com/Nosoynadiemas series on fuzzing the Apache Web Server
https://securitylab.github.com/research/fuzzing-apache-1
https://securitylab.github.com/research/fuzzing-apache-1
Twitter
Antonio Morales (@Nosoynadiemas) | Twitter
The latest Tweets from Antonio Morales (@Nosoynadiemas). Security Researcher at @GitHub @GHSecurityLab working on OSS
fpicker: Fuzzing with Frida
https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/
Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.
https://github.com/ttdennis/fpicker
https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/
Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.
https://github.com/ttdennis/fpicker
Insinuator.net
fpicker: Fuzzing with Frida
Introduction
In this post, I will introduce fpicker. Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms…
In this post, I will introduce fpicker. Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms…
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
https://youtube.com/watch?v=GSCFqDVCwB0&feature=youtu.be
https://youtube.com/watch?v=GSCFqDVCwB0&feature=youtu.be
YouTube
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
Analysis of DTLS Implementations Using Protocol State Fuzzing
Paul Fiterau-Brostean and Bengt Jonsson, Uppsala University; Robert Merget, Ruhr-University Bochum; Joeri de Ruiter, SIDN Labs; Konstantinos Sagonas, Uppsala University; Juraj Somorovsky, Paderborn…
Paul Fiterau-Brostean and Bengt Jonsson, Uppsala University; Robert Merget, Ruhr-University Bochum; Joeri de Ruiter, SIDN Labs; Konstantinos Sagonas, Uppsala University; Juraj Somorovsky, Paderborn…
NDSS 2020 HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
https://youtube.com/watch?v=GmIlLKT_nH8&feature=youtu.be
https://youtube.com/watch?v=GmIlLKT_nH8&feature=youtu.be
YouTube
NDSS 2020 HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
SESSION 1B-1 HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
Applying modern fuzzers to novel targets is often a very lucrative venture. Hypervisors are part of a very critical code base: compromising them could allow an attacker to compromise the whole…
Applying modern fuzzers to novel targets is often a very lucrative venture. Hypervisors are part of a very critical code base: compromising them could allow an attacker to compromise the whole…
Fuzzing sockets: Apache HTTP, Part 1: Mutations
https://securitylab.github.com/research/fuzzing-apache-1/
https://securitylab.github.com/research/fuzzing-apache-1/
Fuzzing sockets: Apache HTTP, Part 2: Custom Interceptors
https://securitylab.github.com/research/fuzzing-apache-2/
https://securitylab.github.com/research/fuzzing-apache-2/
Fuzzing JavaScript npm/nodejs/code (omggif) using jsfuzz (Youtube/Tutorial)
https://www.youtube.com/watch?v=1U_jIeHesZg
https://www.youtube.com/watch?v=1U_jIeHesZg
YouTube
Find Bugs in js/npm/nodejs code using Fuzz Testing (jsfuzz) - JavaScript Security #1
📥 Download source code and materials: https://academy.fuzzinglabs.com/fuzzing-javascript-jsfuzz?coupon=YOUTUBE
In this course, I will fuzz a JavaScript npm/nodejs library (omggif) in order to find uncaught JavaScript exceptions. I will explain how to create…
In this course, I will fuzz a JavaScript npm/nodejs library (omggif) in order to find uncaught JavaScript exceptions. I will explain how to create…
Forwarded from @wardriving
Now #openwifi FPGA allows more control on your needs over the re-transmission and ACK operations under monitor mode. A more powerful WiFi fuzzer can be done! Check out the updated packet injection and fuzzing app note
https://github.com/open-sdr/openwifi/blob/master/doc/app_notes/inject_80211.md#fpga-behavior-control
https://github.com/open-sdr/openwifi/blob/master/doc/app_notes/inject_80211.md#fpga-behavior-control
GitHub
openwifi/doc/app_notes/inject_80211.md at master · open-sdr/openwifi
open-source IEEE 802.11 WiFi baseband FPGA (chip) design: driver, software - open-sdr/openwifi
❤1
#fuzzing v8
Fuzzing Chromes JavaScript Engine v8
https://apt29a.blogspot.com/2022/01/fuzzing-chromes-javascript-engine-v8.html
Fuzzing Chromes JavaScript Engine v8
https://apt29a.blogspot.com/2022/01/fuzzing-chromes-javascript-engine-v8.html
Blogspot
Fuzzing Chromes JavaScript Engine v8
tltr; I developed a coverage-guided (v8) JavaScript fuzzer similar to Fuzzilli (but without an intermediate language and developed in Py...
Internals of Go's new fuzzing system
https://jayconrod.com/posts/123/internals-of-go-s-new-fuzzing-system
https://jayconrod.com/posts/123/internals-of-go-s-new-fuzzing-system
jayconrod.com
Internals of Go's new fuzzing system
Go 1.18 is coming out soon. It's a huge release, but native fuzzing has a special place in my heart. Not much has been written yet on how Go's fuzzing system actually works, so I'll talk a bit about that here.