fuzzit

@fuzzitdev

Continuous Fuzzing Made Simple.

Tel-Aviv, Israel
Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @fuzzitdev

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fuzzitdev

  1. Prikvačeni tweet
    11. pro 2019.
    Poništi
  2. prije 2 sata

    Thanks for great conference!

    Poništi
  3. proslijedio/la je Tweet

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Poništi
  4. 25. sij

    If you are at come hear talk about continuous fuzzing best practices tomorrow 10am

    Poništi
  5. 22. sij

    Come hear talk about Go Fuzzing at berlin

    Poništi
  6. proslijedio/la je Tweet
    21. sij
    Poništi
  7. proslijedio/la je Tweet
    20. sij

    Always wanted to be the first to support structured fuzzing as first-class citizen: func FuzzRegexp(f *testing.F, re string, data []byte, posix bool) {...} But it is! Glad it's slowly moving to industry standard. Maybe it will urge Go :)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. sij

    Not looking forward to next week? We can change that! Come and join us in Berlin at .

    Poništi
  9. proslijedio/la je Tweet
    6. sij

    Only three weeks left until 2020 takes place in . Check out the agenda and get your ticket right away.

    Poništi
  10. 30. pro 2019.

    If you will attend at Tel-Aviv, come hear speak about continuous go fuzzing

    Poništi
  11. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    9. pro 2019.

    Have you already checked the agenda? Now is the time to pick your favorite talks and register for the conference. Tickets are still available.

    Poništi
  13. proslijedio/la je Tweet
    9. pro 2019.
    Prikaži ovu nit
    Poništi
  14. 5. pro 2019.

    Excited to join coalition to help secure software.

    Poništi
  15. proslijedio/la je Tweet
    29. stu 2019.

    uses to find the bugs in 😯🤓 I wonder how bad would be if they didn’t use a 🤪😁

    Poništi
  16. proslijedio/la je Tweet
    25. stu 2019.

    More speakers are coming: Join the talks from and . Register now!

    Poništi
  17. 25. stu 2019.

    ANNOUNCEMENT: We are now doing custom hands-on on-site trainings and workshops about fuzzing both for developers as well as security and vulnerability researchers.

    Poništi
  18. 19. stu 2019.

    ANNOUNCEMENT: Now open sourcing - coverage guided for . Ported from our which in turn inspired by go-fuzz which is in turn inspired by AFL:)

    Poništi
  19. 10. stu 2019.

    Another classic parsing bug found by in omggif.

    Poništi
  20. proslijedio/la je Tweet
    8. stu 2019.

    static analysis, dynamic analysis, fuzzing, property testing, fault injection, coverage overview. Nice to see 2 of my tools mentioned (go-fuzz and -race). KRF (fault injection) was new to me.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·