norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.6K
active users

#fuzzing

0 posts0 participants0 posts today
Advanced Fuzzing League<p>🚨 LibAFL 0.15.2 🚨 </p><ul><li>Rust 2024 edition</li><li>LibAFL_Unicorn</li><li>Use LibAFL rand types for other crates</li><li>Allow logging to StatsD</li><li>LibAFL_QEMU updates like binary-only ASan in Rust 🦀🦀🦀, inputs via StdIn, better snapshots</li></ul><p>And so much more:</p><p><a href="https://github.com/AFLplusplus/LibAFL/releases/tag/0.15.2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/AFLplusplus/LibAFL/</span><span class="invisible">releases/tag/0.15.2</span></a></p><p><a href="https://infosec.exchange/tags/LibAFL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibAFL</span></a> <a href="https://infosec.exchange/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a> <a href="https://infosec.exchange/tags/AFLplusplus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AFLplusplus</span></a></p>
Thor A. Hopland<p>What's happening in the <a href="https://snabelen.no/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> government right now seems like they're "<a href="https://snabelen.no/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://snabelen.no/tags/democracy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>democracy</span></a>", that is overwhelming the system and the opposition in order to install autocracy.</p><p>The primary problem IMHO being that the <a href="https://snabelen.no/tags/constitution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>constitution</span></a> is still written in an antiquated form of <a href="https://snabelen.no/tags/English" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>English</span></a> which allows an <a href="https://snabelen.no/tags/elite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elite</span></a> class of specialized <a href="https://snabelen.no/tags/lawyers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lawyers</span></a> to interpret laws, and therefore be gatekeepers of law.</p><p>This is what idolization of documents gets you. At the very least update the phrasing to be more clear.</p>
detektor.fm :dfm:<p>Sicherheitslücken in Computerprogrammen sind riskant. Mit Fuzzing sollen sie entdeckt werden, bevor sie Schaden anrichten können. Doch die Methode ist aufwendig — bis jetzt. Prof. Andreas Zeller vom CISPA in Saarbrücken will das ändern.</p><p><a href="https://social.detektor.fm/tags/CISPA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISPA</span></a> <a href="https://social.detektor.fm/tags/Cyberangriffe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriffe</span></a> <a href="https://social.detektor.fm/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://social.detektor.fm/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a> <a href="https://social.detektor.fm/tags/Informationssicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Informationssicherheit</span></a> <a href="https://social.detektor.fm/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.detektor.fm/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://social.detektor.fm/tags/Forschungsquartett" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forschungsquartett</span></a> </p><p><a href="https://detektor.fm/wissen/forschungsquartett-wie-fuzzing-sicherheitsluecken-findet?utm_campaign=share_on_mastodon&amp;utm_medium=mastodon&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">detektor.fm/wissen/forschungsq</span><span class="invisible">uartett-wie-fuzzing-sicherheitsluecken-findet?utm_campaign=share_on_mastodon&amp;utm_medium=mastodon&amp;utm_source=mastodon</span></a></p>
Advanced Fuzzing League<p>Code with us at this year's Goole Summer of Code!</p><p><a href="https://infosec.exchange/tags/GSoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GSoC</span></a> <a href="https://infosec.exchange/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a></p><p><a href="https://summerofcode.withgoogle.com/programs/2025/organizations/aflplusplus" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">summerofcode.withgoogle.com/pr</span><span class="invisible">ograms/2025/organizations/aflplusplus</span></a></p>
Marcel SIneM(S)US<p>Wie können wir ein zweites «<a href="https://social.tchncs.de/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a>» vermeiden? - Das Netz ist politisch <a href="https://dnip.ch/2024/07/23/zweites-crowdstrike-verhindern/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2024/07/23/zweites-cro</span><span class="invisible">wdstrike-verhindern/</span></a> <a href="https://social.tchncs.de/tags/DNIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNIP</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> :windows: <a href="https://social.tchncs.de/tags/Monitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Monitoring</span></a> <a href="https://social.tchncs.de/tags/StagedRollout" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StagedRollout</span></a> <a href="https://social.tchncs.de/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a> <a href="https://social.tchncs.de/tags/VendorLockIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VendorLockIn</span></a> <a href="https://social.tchncs.de/tags/LastKnownGoodState" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LastKnownGoodState</span></a> <a href="https://social.tchncs.de/tags/MoveFastAndBreakThings" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MoveFastAndBreakThings</span></a></p>
pty<p>Kennt ihr <a href="https://chaos.social/tags/wuppiefuzz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wuppiefuzz</span></a> ?</p><p>Ist ein coverage-guided REST-Fuzzer und Open-Source. </p><p>Bin heute darüber gestolpert und dacht das ist teilenswert.</p><p><a href="https://github.com/TNO-S3/WuppieFuzz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/TNO-S3/WuppieFuzz</span><span class="invisible"></span></a></p><p><a href="https://chaos.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
Orhun Parmaksız 👾<p>Fuzzing? From the CLI? Fast? Say less.</p><p>🕸️ **rwalk**: A blazingly fast web directory scanner.</p><p>🔥 Designed for fast recursive scans and handling large wordlists.</p><p>🦀 Written in Rust!</p><p>⭐ GitHub: <a href="https://github.com/cestef/rwalk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cestef/rwalk</span><span class="invisible"></span></a></p><p><a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a> <a href="https://fosstodon.org/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://fosstodon.org/tags/scanner" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scanner</span></a> <a href="https://fosstodon.org/tags/directory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>directory</span></a> <a href="https://fosstodon.org/tags/commandline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commandline</span></a> <a href="https://fosstodon.org/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://fosstodon.org/tags/dirsearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dirsearch</span></a></p>
Linux Magazine<p>In this week's Linux Update newsletter, Chris Binnie looks at the enumeration tools feroxbuster and ffuf for automating search during a cyberattack<br><a href="https://www.linux-magazine.com/Issues/2025/290/Enumerating-Resources" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Issues/2025</span><span class="invisible">/290/Enumerating-Resources</span></a><br><a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/tools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tools</span></a> <a href="https://fosstodon.org/tags/feroxbuster" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>feroxbuster</span></a> <a href="https://fosstodon.org/tags/ffuf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ffuf</span></a> <a href="https://fosstodon.org/tags/enumeration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enumeration</span></a> <a href="https://fosstodon.org/tags/cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattack</span></a> <a href="https://fosstodon.org/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a> <a href="https://fosstodon.org/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
Marco Ivaldi<p>Cool network <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> tool</p><p><a href="https://github.com/claesmnyberg/netfuzz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/claesmnyberg/netfuz</span><span class="invisible">z</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>A friend pointed me at this:</p><p><a href="https://github.com/claesmnyberg/netfuzz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/claesmnyberg/netfuz</span><span class="invisible">z</span></a></p><p><a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a>, <a href="https://infosec.exchange/tags/fullstack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fullstack</span></a>, <a href="https://infosec.exchange/tags/bsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bsd</span></a></p>
Advanced Fuzzing League<p>We just released AFL++ v4.30c - deprecate afl-gcc/clang, fast resume support, lots of improvements. <a href="https://github.com/AFLplusplus/AFLplusplus/releases/tag/v4.30c" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/AFLplusplus/AFLplus</span><span class="invisible">plus/releases/tag/v4.30c</span></a> <a href="https://infosec.exchange/tags/afl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>afl</span></a> <a href="https://infosec.exchange/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a> <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
danzin<p>We're up to 30 <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> crashers found using <a href="https://mastodon.social/tags/Fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fusil</span></a> this year, about 90% of them considered valid.</p><p>In 2008, I had reported 5 cases using the same <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a>, 4 of which were release blockers.</p><p><span class="h-card" translate="no"><a href="https://mamot.fr/@vstinner" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vstinner</span></a></span>, Fusil's creator, also reported a bunch of issues with it.</p><p>After running for a while (on free AWS and Oracle cloud tiers), crash hits are getting harder to find.</p><p>We need new fuzzing inputs. Feel free to suggest improvements that could find new crashers.</p><p><a href="https://github.com/devdanzin/fusil" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/devdanzin/fusil</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a></p>
danzin<p>I have just republished @vstinner's fuzzing tool fusil:<br><a href="https://github.com/devdanzin/fusil" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/devdanzin/fusil</span><span class="invisible"></span></a></p><p>It's a library for creating fuzzers. I've been using it to find crashers in <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> (23 found so far) and <a href="https://mastodon.social/tags/PyPy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PyPy</span></a> (15 found so far).</p><p>The <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a> works by generating random code with function/method calls using random arbitrary (and interesting) values, then recording code execution and matching specific error messages.</p><p>I'm only <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> Python, feel free to use it for whatever you want ;)</p><p>cc <span class="h-card" translate="no"><a href="https://mastodon.social/@cfbolz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cfbolz</span></a></span></p>
maschmi<p>This is a wonderful article series about nix and automating <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> to discover <a href="https://mastodon.social/tags/bugs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugs</span></a> and possible <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> issues. I just skimmed it, but it looks detailed and is nice to read. Also, I cannot claim to understand all of it ;)</p><p>Thank you <span class="h-card" translate="no"><a href="https://m.mtlynch.io/@michael" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>michael</span></a></span> </p><p><a href="https://mtlynch.io/nix-fuzz-testing-1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">mtlynch.io/nix-fuzz-testing-1/</span><span class="invisible"></span></a></p>
0xor0ne<p>Fuzzing ZBar barcode scanning library</p><p><a href="https://blog.trailofbits.com/2024/10/31/fuzzing-between-the-lines-in-popular-barcode-software/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.trailofbits.com/2024/10/3</span><span class="invisible">1/fuzzing-between-the-lines-in-popular-barcode-software/</span></a></p><p>Credits Artur Cygan</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
floyd aka floyd_ch<p>So what do you all use to do HTTP <a href="https://chaos.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a>? Not Web App Scanning, but rather "here's the weirdest embedded-device self-made web server, have fun because maybe I do have a string format vuln" style of <a href="https://chaos.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://chaos.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a></p>
ITSEC News<p>Fuzzing between the lines in popular barcode software - By Artur Cygan<br>Fuzzing—one of the most successful techniques for finding security bugs, c... <a href="https://blog.trailofbits.com/2024/10/31/fuzzing-between-the-lines-in-popular-barcode-software/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.trailofbits.com/2024/10/3</span><span class="invisible">1/fuzzing-between-the-lines-in-popular-barcode-software/</span></a> <a href="https://schleuss.online/tags/applicationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>applicationsecurity</span></a> <a href="https://schleuss.online/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
Derick Rethans<p>For <span class="h-card" translate="no"><a href="https://phpc.social/@Xdebug" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Xdebug</span></a></span>'s native path mapping, I need to parse a file.</p><p>This afternoon I played around with AFL++, a fuzzing tool to see if I had missed a few edge cases. It works a little like Infection PHP, but then for C programs.</p><p>Turned out I had missed egde cases that the fuzzer found, and I ended up fixing four bugs!</p><p><a href="https://phpc.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a> <a href="https://phpc.social/tags/testing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testing</span></a> <a href="https://phpc.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
Dennis Doomen<p>If you have never heard of <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> in automated testing (like me), check out <a href="https://mijailovic.net/2019/01/03/sharpfuzz/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mijailovic.net/2019/01/03/shar</span><span class="invisible">pfuzz/</span></a>.</p>
derPUPE<p>Der <a href="https://chaos.social/tags/Quantencomputer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Quantencomputer</span></a> in meinem <a href="https://chaos.social/tags/Kopf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kopf</span></a> nennt sich <a href="https://chaos.social/tags/Hirn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hirn</span></a> und steht auf <a href="https://chaos.social/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a></p>