Rezultati pretraživanja
  1. 10. lis 2019.

    Fuzzing closed source applications using by

    Prikaži ovu nit
  2. 11. pro 2019.

    Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing

  3. 22. ruj 2017.
  4. 10. lis 2019.
  5. 20. pro 2019.

    Qt Gif parsing null deref rediscovered with

  6. 9. svi 2019.

    My first ZDI report with team members

  7. 27. kol 2019.

    Some bugs I've discovered recently with . It's in 3rd party image viewer on windows: ACDSsee, XnView, FastStone and I IrfanView. There are 20+ CVEids but It seems it's not so simple to build least one exploit on top of it

  8. 6. stu 2019.
  9. 19. ruj 2019.

    A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU

  10. So tried intel PT mode with , and for me its very slow! dynamorio is much much better.

  11. 27. pro 2018.
  12. 1. svi 2018.

    16h to put working

  13. added option to AFL_Runner.py to first run winafl with drrun.exe in debug mode to generate log.

    Prikaži ovu nit
  14. 21. velj 2019.

    😯Extracting a 19 Year Old Code Execution from -> 👉In this article, we tell the story of how we found a logical bug using the fuzzer and exploited it in to gain full control over a victim’s computer.

    Prikaži ovu nit
  15. 23. pro 2018.

    My first DLL reversing, writing harness for , wish me some crashes

  16. 12. pro 2018.
  17. 22. velj 2019.

    Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research

  18. 27. srp 2016.

    Using LoadLibrary() with drops exec speed to 16 exec/sec. Any ideas to enhance the performance?

  19. The hardest part in fuzzing with is writing a harness. Rest win AFL will take care 😎

  20. 23. ruj 2017.
    Tweet je nedostupan.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.