b33f | 🇺🇦✊(@FuzzySec) 's Twitter Profile Photo

I wrote a post on coverage guided fuzzing for native Android libraries (using Frida & Radamsa), check it out on KnifeCoat 🔪🧥

knifecoat.com/Posts/Coverage…

I wrote a post on coverage guided fuzzing for native Android libraries (using Frida & Radamsa), check it out on KnifeCoat 🔪🧥

knifecoat.com/Posts/Coverage…
account_circle
Marcel Böhme👨‍🔬(@mboehme_) 's Twitter Profile Photo

Recently modified code and sanitizer instrumentation seem to be among the most effective heuristics for target selection in directed according to this recent SoK by Weissberg et al. LLMs show much promise for target selection, too.

📝 mlsec.org/docs/2024c-asi…

Recently modified code and sanitizer instrumentation seem to be among the most effective heuristics for target selection in directed #fuzzing according to this recent SoK by Weissberg et al. LLMs show much promise for target selection, too.

📝 mlsec.org/docs/2024c-asi…
account_circle
El Pingüino De Mario(@PinguinoDeMario) 's Twitter Profile Photo

Demostración de cómo podemos programar un script de Python para realizar fuzzing web, de tal forma que veremos la aplicación de Python en la ciberseguridad. programming ciberseguridad

account_circle
Yasser | Skidrow 🇸🇦(@firfox20) 's Twitter Profile Photo

When You Recon for Old Urls, and there is to much output you Can use , cut or awk to print only found paths then export them as a fuzzing wordlist .txt and test them , found me a file upload :)

When You Recon for Old Urls,  and there is to much output you Can use , cut or awk to print only found paths  then export them as a fuzzing wordlist .txt  and  test them ,  found me a file upload :)
#bugbountytips
account_circle
Fares Walid 🇪🇬🇵🇸(@SirBagoza) 's Twitter Profile Photo

بسم الله الرحمن الرحيم والصلاة والسلام على أشرف المرسلين سيدنا محمد
Bismillah 🫡🫡

Today, I've written the tool of the next video on the youtube and published it on github !!
The Whole Automation and Reporting of the fuzzing process.

⭐️ Why I made this tool?
ANSWER:
- As a wide…

بسم الله الرحمن الرحيم والصلاة والسلام على أشرف المرسلين سيدنا محمد
Bismillah 🫡🫡

Today, I've written the tool of the next video on the youtube and published it on github !!
The Whole Automation and Reporting of the fuzzing process.

⭐️ Why I made this tool?
ANSWER:
- As a wide…
account_circle
FuzzingLabs(@FuzzingLabs) 's Twitter Profile Photo

📡 [Monthly Fuzzing] May 2024

Here is the latest fuzzing news released last month!

📺 Videos/Podcasts

- Discoveries from Analyzing 141 Real-World ZK-SNARK Vulnerabilities! 🧐 - youtu.be/oxvcEXha69c

📝 Blogposts/Papers/Slides

- ImageIO, the infamous iOS Zero Click Attack…

📡 [Monthly Fuzzing] May 2024

Here is the latest fuzzing news released last month!

📺 Videos/Podcasts

- Discoveries from Analyzing 141 Real-World ZK-SNARK Vulnerabilities! 🧐 - youtu.be/oxvcEXha69c

📝 Blogposts/Papers/Slides

- ImageIO, the infamous iOS Zero Click Attack…
account_circle
0sman(@abdallah_osman4) 's Twitter Profile Photo

when I test on one of my private targets on h1 I found this site that have an service for administrators of the site but I try some techniques after some fuzzing I found this endpoint /admin/index.html with a white page
Can us help me Godfather Orwa 🇯🇴 🇸🇦 ROOD | GOAT

when I test on one of my private targets on h1 I found this site that have an service for administrators of the site  but I try some techniques after some fuzzing I found this endpoint /admin/index.html with a white page
Can us help me @GodfatherOrwa @0x_rood
account_circle
Emile Baizel(@emilebaizel) 's Twitter Profile Photo

📅 T-8 days until the Euler Labs🛢️🇬🇧 v2 competition.

Continuing with refreshing our knowledge of known vulnerabilities, today let's read Dacian's article about exploiting precision loss via fuzzing dacian.me/exploiting-pre…

Onward, researcher

account_circle
Richard Johnson(@richinseattle) 's Twitter Profile Photo

If you liked Bill Demirkapi @ Offensive Con’s great talk on Secure Boot at offensivecon (new remote write vuln over HTTP boot - my fuzzing students will notice that glaring Content-Length bug) be sure to check out the two prior research releases from my team at Eclypsium!

If you liked @BillDemirkapi’s great talk on Secure Boot at @offensive_con (new remote write vuln over HTTP boot - my fuzzing students will notice that glaring Content-Length bug) be sure to check out the two prior research releases from my team at @eclypsium!
account_circle