hungtt28

@hungtt28

Fuzzing, Automation

Vrijeme pridruživanja: siječanj 2015.

Tweetovi

Blokirali ste korisnika/cu @hungtt28

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hungtt28

  1. proslijedio/la je Tweet

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Poništi
  2. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas 😃

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  5. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  6. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  7. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  8. proslijedio/la je Tweet
    2. sij

    Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....

    Poništi
  9. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.

    I blog about writing custom protobuf mutation routines for fuzzing: Happy holidays and happy fuzzing! May you beat randomness with a custom mutation and find that elusive bug :-)

    Poništi
  12. proslijedio/la je Tweet
    27. pro 2019.

    I've implemented a fuzzer for PHP: Fuzzing is a great way to find obscure bugs in parsing libraries...

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1286 (Windows Kernel): Null Pointer Dereference in the AlphaBlend function in win32kfull.sys

    Poništi
  15. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  16. proslijedio/la je Tweet
    22. pro 2019.

    Porting a JavaScript App to WebAssembly with Rust (Part 1) a blog post that follows the progress of migrating a website () to Rust using the Seed () framework

    Poništi
  17. proslijedio/la je Tweet
    20. pro 2019.

    JavaScript fuzzing with libFuzzer

    Poništi
  18. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  19. proslijedio/la je Tweet
    17. pro 2019.

    In this blog, the bandit explains what security issues could lead to a successful privilege escalation attack on any Linux based systems.    

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    You have two weeks left to join our Capture the Flag contest and win a Nintendo Switch, or cool GitHub swag! Write a CodeQL query to find a specific class of DOM-based XSS vulnerabilities.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·