Hey guys,
Happy summer holiday everyone! ⛱️
📺 Videos / Podcasts
- Fuzzer Crash Root Cause Analysis With ASAN (AddressSanitizer) - link
- Fuzzing network application with AFL or AFLplusplus using Preeny - link
- Firmware Reverse Engineering with Ghidra (Thomas Roth) - link
-
Fuzzing Basebands with BaseSAFE (Dominik Maier) - link
- In-Process Fuzzing with Frida (Dennis Heinze) - link
- What is a Browser Security Sandbox?! (Learn to Hack Firefox) - link
- Blackbox Fuzzing #4: Binary-only fuzzing using AFL++ FRIDA mode - link
- Foundations of Software Testing - link
- Using Jackalope fuzzer to fuzz a windows binary - link
📝 Blogposts/Papers/Slides
- Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+ - link
- Fuzzing grub, part 2: going faster - link
- WRITING A (TOY) SYMBOLIC INTERPRETER, AND SOLVING CHALLENGES, PART 1 - link
-
Fuzzing modern UDP game protocols with snapshot-based fuzzers - link
- Methodology for Static Reverse Engineering of Windows Kernel Drivers - link
- Kernel Pwning with eBPF: a Love Story - link
⚙️ Tools / Repositories
- FunkyFunFuzzer / fffz: PoC snapshot fuzzer for blackbox binaries - link
- AutoHarness: A tool that automatically creates fuzzing harnesses - link
-
wtf: distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and/or kernel-mode targets running on Microsoft Windows. - link
- Bazel Rules for Fuzz Tests: Bazel Starlark extensions for defining fuzz tests in Bazel projects - link
- Sloth: coverage guided fuzzing framework for fuzzing Android Native libraries - link
- rewind: Snapshot-based coverage-guided windows kernel fuzzer - link
-
Symbolic Execution Fuzzing With KLEE - link
- Repository of the findings found by wtf fuzzer when fuzzing IDA75 - link
Please, don't forget to share this with your friends/colleagues and subscribe to my
youtube channel, it's really helping me to create even more free content! 🙏
See you next month and take care!
📡 Socials:
Twitter |
Telegram |
YoutubePatrick