Google Chrome display locking fuzzing
https://blog.redteam.pl/2020/04/google-chrome-display-locking-fuzzing.html
https://blog.redteam.pl/2020/04/google-chrome-display-locking-fuzzing.html
blog.redteam.pl
Google Chrome display locking fuzzing
red team, blue team, penetration testing, red teaming, threat hunting, digital forensics, incident response, cyber security, IT security
14 0-click vulnerabilities in Image I/O (Apple's image parsing framework) for iOS, macOS, watchOS, tvOS🎯
https://googleprojectzero.blogspot.com/2020/04/fuzzing-imageio.html
https://googleprojectzero.blogspot.com/2020/04/fuzzing-imageio.html
Blogspot
Fuzzing ImageIO
Posted by Samuel Groß, Project Zero This blog post discusses an old type of issue, vulnerabilities in image format parsers, in a new(er)...
FI(le) SY(stem) - full file system fuzzing framework
Source: https://github.com/0xricksanchez/fisy-fuzz
Video from HITB 2020: https://www.youtube.com/watch?v=VNzKVOsn5qQ&feature=youtu.be&t=17032
Materials: https://github.com/0xricksanchez/HITB2020_FSFUZZER
#fuzzing
Source: https://github.com/0xricksanchez/fisy-fuzz
Video from HITB 2020: https://www.youtube.com/watch?v=VNzKVOsn5qQ&feature=youtu.be&t=17032
Materials: https://github.com/0xricksanchez/HITB2020_FSFUZZER
#fuzzing
GitHub
GitHub - 0xricksanchez/fisy-fuzz: This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown…
This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April. - 0xricksanchez/fisy-fuzz
gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats.
Official site: https://d0c-s4vage.github.io/gramfuzz/
Source: https://github.com/d0c-s4vage/gramfuzz
Official site: https://d0c-s4vage.github.io/gramfuzz/
Source: https://github.com/d0c-s4vage/gramfuzz
GitHub
GitHub - d0c-s4vage/gramfuzz: gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary…
gramfuzz is a grammar-based fuzzer that lets one define complex grammars to generate text and binary data formats. - d0c-s4vage/gramfuzz
[CVE49] Microsoft Windows LNK Remote Code Execution Vulnerability - CVE-2020-1299
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
Source: https://github.com/HexHive/FuZZan
Article: http://hexhive.epfl.ch/publications/files/20ATC.pdf
Source: https://github.com/HexHive/FuZZan
Article: http://hexhive.epfl.ch/publications/files/20ATC.pdf
GitHub
GitHub - HexHive/FuZZan: FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing - HexHive/FuZZan
MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface
https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-1-introduction-to-qmage.html
https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-1-introduction-to-qmage.html
Blogspot
MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface
Posted by Mateusz Jurczyk, Project Zero This post is the first of a multi-part series capturing my journey from discovering a vulnerable...