Fuzzing – Telegram
Forwarded from Ghidra (SRE)
LaunchWinAFL Usage:

1) Install dynamorio and winafl
2) add https://gist.github.com/richinseattle/613105953003ec5e1f24ca17b2d8541f to ghidra noscripts, set some one-time config at top; install paths, etc
3) load target exe & coverage dlls into ghidra
4) go to target function in disasm
5) run noscript to start fuzzing!
This post will explain the process of finding and exploiting a previously unknown vulnerability in a real-world piece of software to achieve code execution. The vulnerability was initially found in 2016 and the vendor was contacted however no response was ever received. Now several years later (March 2019 at time of writing), the vulnerability still exists in the latest version.

https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3
Fuzzing pinned «A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis. https://github.com/secfigo/Awesome…»
Channel photo updated