Hey guys,
Happy summer holiday everyone! ⛱️
📺 Videos / Podcasts
Fuzzer Crash Root Cause Analysis With ASAN (AddressSanitizer) - link
Fuzzing network application with AFL or AFLplusplus using Preeny - link
Firmware Reverse Engineering with Ghidra (Thomas Roth) - link
Fuzzing Basebands with BaseSAFE (Dominik Maier) - link
In-Process Fuzzing with Frida (Dennis Heinze) - link
What is a Browser Security Sandbox?! (Learn to Hack Firefox) - link
Blackbox Fuzzing #4: Binary-only fuzzing using AFL++ FRIDA mode - link
Foundations of Software Testing - link
Using Jackalope fuzzer to fuzz a windows binary - link
📝 Blogposts/Papers/Slides
Analyzing CVE-2021-1665 – Remote Code Execution Vulnerability in Windows GDI+ - link
Fuzzing grub, part 2: going faster - link
WRITING A (TOY) SYMBOLIC INTERPRETER, AND SOLVING CHALLENGES, PART 1 - link
Fuzzing modern UDP game protocols with snapshot-based fuzzers - link
Methodology for Static Reverse Engineering of Windows Kernel Drivers - link
Kernel Pwning with eBPF: a Love Story - link
⚙️ Tools / Repositories
FunkyFunFuzzer / fffz: PoC snapshot fuzzer for blackbox binaries - link
AutoHarness: A tool that automatically creates fuzzing harnesses - link
wtf: distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and/or kernel-mode targets running on Microsoft Windows. - link
Bazel Rules for Fuzz Tests: Bazel Starlark extensions for defining fuzz tests in Bazel projects - link
Sloth: coverage guided fuzzing framework for fuzzing Android Native libraries - link
rewind: Snapshot-based coverage-guided windows kernel fuzzer - link
Symbolic Execution Fuzzing With KLEE - link
Repository of the findings found by wtf fuzzer when fuzzing IDA75 - link
Please, don't forget to share this with your friends/colleagues and subscribe to my youtube channel, it's really helping me to create even more free content! 🙏
See you next month and take care!
📡 Socials: Twitter | Telegram | Youtube
Patrick