$22k awarded to SBFT โ23 fuzzing competition winners - https://security.googleblog.com/2023/05/22k-awarded-to-sbft-23-fuzzing.html
Google Online Security Blog
$22k awarded to SBFT โ23 fuzzing competition winners
Dongge Liu, Jonathan Metzman and Oliver Chang, Google Open Source Security Team Googleโs Open Source Security Team recently sponsored a fuzz...
๐คฉ2
Unearthing Vulnerabilities in the Apple Ecosystem The Art of KidFuzzerV2.0 - https://github.com/star-sg/Presentations/blob/main/Offensivecon%202023/Unearthing%20Vulnerabilities%20in%20the%20Apple%20Ecosystem%20The%20Art%20of%20KidFuzzerV2.0.pdf
GitHub
Presentations/Offensivecon 2023/Unearthing Vulnerabilities in the Apple Ecosystem The Art of KidFuzzerV2.0.pdf at main ยท star-โฆ
Contribute to star-sg/Presentations development by creating an account on GitHub.
OffensiveCon23 - Stacksmashing- Inside Appleโs Lightning: JTAGging the iPhone for Fuzzing and Profit - https://www.youtube.com/watch?v=-nFWcKHIUN4
YouTube
OffensiveCon23 - Stacksmashing- Inside Appleโs Lightning: JTAGging the iPhone for Fuzzing and Profit
https://www.offensivecon.org/speakers/2023/ghidraninja.html
โค4
OffensiveCon23 - Samuel Groร & Carl Smith - Advancements in JavaScript Engine Fuzzing - https://www.youtube.com/watch?v=Yd9m7e9-pG0
YouTube
OffensiveCon23 - Samuel Groร & Carl Smith - Advancements in JavaScript Engine Fuzzing
https://www.offensivecon.org/speakers/2023/samuel-gross-and-carl-smith.html
โค3
Fine-Grained Coverage-Based Fuzzing - https://binsec.github.io/assets/publications/slides/2023-tosem.pdf
๐2
Automated security testing of unexplored targets through feedback-guided fuzzing - https://depositonce.tu-berlin.de/items/c3aaf2ec-8036-4651-a609-9c3b11a7f705
depositonce.tu-berlin.de
Automated security testing of unexplored targets through feedback-guided fuzzing
Fuzzing is an automated method to uncover bugs in software. A fuzzer will generate inputs to a target program and execute the target repeatedly, in rapid succession. These random mutations aim to reach corner cases a human tester will not detect easily. Fuzzingโฆ
๐ฅ3
GDBFuzz: Coverage-guided Fuzzing on Embedded Systems using Hardware Breakpoints - https://medium.com/security-garten/gdbfuzz-fuzzing-on-embedded-systems-using-hardware-breakpoints-5cafdaf4c2c0
Medium
GDBFuzz: Fuzzing on Embedded Systems using Hardware Breakpoints
Debugger-driven and coverage-guided
๐ฅ2
Fuzzing Introspection of OSS-Fuzz projects - https://introspector.oss-fuzz.com/
๐2
Jackalope fuzzer support is now working on Linux - https://twitter.com/ifsecure/status/1669364113745629185?t=9TJ2raFjZg-vqcabWNV50g&s=03 / https://github.com/googleprojectzero/Jackalope
rusty-radamsa: Radamsa fuzzer ported to rust lang - https://github.com/microsoft/rusty-radamsa
GitHub
GitHub - microsoft/rusty-radamsa: Radamsa fuzzer ported to rust lang
Radamsa fuzzer ported to rust lang. Contribute to microsoft/rusty-radamsa development by creating an account on GitHub.
๐ฅ5๐1
Advanced binary fuzzing using AFL++-QEMU and libprotobuf - https://airbus-seclab.github.io/AFLplusplus-blogpost/
๐2
The art of Fuzzing: Introduction - https://bushido-sec.com/index.php/2023/06/19/the-art-of-fuzzing
Bushido Security
The art of Fuzzing: Introduction. - Bushido Security
This fuzzing introduction cover all the essentials one should know about the art of fuzzing. It explain major concept and illustrate it with and hands-on exercise the reader can follow. In conclusion some hints are given on how to hunt for bugs with fuzzing.
๐3
SAFIREFUZZ: Same-Architecture Firmware Rehosting and Fuzzing - https://github.com/pr0me/SAFIREFUZZ
GitHub
GitHub - pr0me/SAFIREFUZZ: Same-Architecture Firmware Rehosting and Fuzzing
Same-Architecture Firmware Rehosting and Fuzzing. Contribute to pr0me/SAFIREFUZZ development by creating an account on GitHub.
๐ฅ1
Snapshot Fuzzing with WTF Fuzzer - https://youtu.be/ZT01RaC4SKs
YouTube
Snapshot Fuzzing with WTF Fuzzer
๐ฅ In this video, we dive into the world of snapshot fuzzing and explore the powerful capabilities of the WTF Fuzzer. ๐
00:00 Introduction
00:50 How to configure Hyper-V
13:47 How to use lockmem tool to avoid pagefaults?
15:00 Understanding harness code,โฆ
00:00 Introduction
00:50 How to configure Hyper-V
13:47 How to use lockmem tool to avoid pagefaults?
15:00 Understanding harness code,โฆ
๐1๐1
Fuzzing Against the Machine: docker image - https://packtservices-my.sharepoint.com/personal/nithikc_packt_com/_layouts/15/onedrive.aspx?id=%2Fpersonal%2Fnithikc%5Fpackt%5Fcom%2FDocuments%2FResources&ga=1
Ghidralligator: Emulate and Fuzz the Embedded World - https://www.cyber.airbus.com/ghidralligator_emulate_and_fuzz_the_embedded_world/
cyber
Newsroom
Access to our latest cyber stories, press releases, case studies and events.