MicrosVuln

@microsvuln

Vulnerability under the 🔬Microscope

Microscope
Joined May 2019

Tweets

You blocked @microsvuln

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @microsvuln

  1. Pinned Tweet
    15 Nov 2019

    Awesome-AFL : A curated list of different AFL forks and AFL inspired with detailed equivalent academic papers with AFL-fuzzing tutorials

    Show this thread
    Undo
  2. Retweeted
    21 hours ago

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Undo
  3. Retweeted
    15 hours ago

    Yet another vulnerability in sudo

    Undo
  4. Feb 1

    DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.

    Undo
  5. Retweeted
    Jan 30

    Do you know ? It brings interesting add-ons to AFL. used it during his fuzzing research to create custom instrumentation whitelists, increasing AFL code coverage

    Undo
  6. Retweeted
    Jan 30

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Undo
  7. Jan 30

    PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610 python

    Undo
  8. Retweeted

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Undo
  9. Jan 29

    Fuzzing software: common challenges and potential solutions (Part 1)

    Undo
  10. Jan 27

    A few more efficient fuzzers has already been added to list . Check Thanks to van Hauser

    Show this thread
    Undo
  11. Jan 22

    ApplicationInspector - source code analyzer by Microsoft

    Undo
  12. Jan 10

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Undo
  13. Retweeted
    Jan 4

    Interesting paper qualitatively analyzing reverse engineering process & methods

    Undo
  14. Retweeted
    20 Dec 2019

    Qt Gif parsing null deref rediscovered with

    Undo
  15. Retweeted
    19 Dec 2019

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Undo
  16. 19 Dec 2019
    Undo
  17. 19 Dec 2019
    Undo
  18. Retweeted
    16 Dec 2019
    Replying to

    Procmon works very well for me. If I were to write my own tooling, I would write something similar to process monitor, atleast visually, that allows you to hook arbitrary functions (ones that are used for resource access) to find race conditions elsewhere, not just filesystem

    Undo
  19. Retweeted
    13 Dec 2019
    Undo
  20. 13 Dec 2019
    Undo
  21. 11 Dec 2019

    Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·