#Fuzzing

Stefano Zacchirolizacchiro@mastodon.xyz
2026-02-01

The video of the talk is now available here: video.fosdem.org/2026/ub5132/B

Check it out if you're in #security and/or #fuzzing. I guarantee it will be worth your time and you'll have fun too!

Stefano Zacchirolizacchiro@mastodon.xyz
2026-01-31

WOW! Full #security devroom at #FOSDEM, for the presentation of "ROSA: finding #backdoors with #fuzzing" by my fellow co-authors @plumtrie and M. Marcozzi.

More about this work in the full paper at arxiv.org/abs/2505.08544 (#openaccess, of course)

TenguConTenguCon
2026-01-29

Justus Wilhelm Perlwitz's talk from 2.0 on QEMU and AFL++ fuzzing for MIPS-based networking equipment is available now!

Check it out!

youtube.com/watch?v=CWHhpSqZKeE

Prague PostgreSQL Dev Dayp2d2
2026-01-28

Fuzzing PostgreSQL at the front door 🔍

Adam Wołk Microsoft shows how fuzzing uncovers edge-case bugs in libpq and . Learn how to build harnesses, mutate protocol inputs, and harden Postgres networking code against real-world failures. p2d2.cz/en/talks/knocking_at_t

#OpenSource

Szymon Błaszczyńskineosb
2026-01-15

Hej!

I have recently write for no particular reason my version of ffuf, wfuzz, dirbuster and such, named DirNutek in . It’s open-source and completely free. Don’t hesitate to try it out for yourself or skim through the code and drop your issues or add something new.

Spoiler. I wrote this using only Gemini CLI and had to help it during development only once or twice.

neosb.net/blog/dirnutek

danzindanzin
2026-01-12

Published my first PyPI package today, called lafleur.

is a specialized CPython JIT fuzzer that uses a coverage-guided, evolutionary approach. It executes test cases, observes their effect on the JIT's state by analyzing verbose trace logs, and uses that feedback to guide its mutations, becoming smarter at finding interesting code paths over time.

Let me know if you use it or have any questions.

pypi.org/project/lafleur/
github.com/devdanzin/lafleur

Sibinsibin
2026-01-11

All papers: we improved coverage by 0.1025% but discovered 100 new previously unknown vulnerabilities! 😂

2026-01-08

Нечёткое тестирование свойств

Есть две категории программистов. Первая пишет тесты, вторая работает. Шутейка, конечно, на троечку, но в каждой байке, застрявшей в пабликах мёртвых заархивированных форумов, под пылью и нафталином, — можно нащупать слой гранита настоящей правды. Модное ныне «покрытие кода тестами» напоминает попытку оклеить айсберг новогодней мишурой — вроде и весело, но Титаник все равно пойдет на дно. Я собираюсь рассказать о том, как правильно тестировать код в изоляции (интеграционные тесты — зверь из соседнего вольера, и о нем — в другой раз). Для этого нам потребуется пара определений. Фаззинг (от английского fuzzing ) — это способ тестирования, при котором программе скармливают огромные объемы случайных, полуслучайных или вообще намеренно испорченных данных, с надеждой выявить уязвимости или баги. Изначально этот метод применялся в академической среде для поиска дыр в безопасности, но быстро перекочевал в руки здравомыслящих разработчиков. Property-based testing , в свою очередь, представляет собой подход к тестированию, где вместо проверки конкретных примеров типа «дважды два — четыре» мы формулируем общие свойства системы. Например: «если функция принимает список и возвращает список, то длина результата не должна превышать длину входа». А дальше уже инструмент генерирует тысячи, миллионы вариантов входных данных и проверяет, соблюдается ли это условие. Taste it!

habr.com/ru/articles/983538/

#propertybasedtesting #fuzzing #testing

I've added the slides and the source code for the Sokoban game to the links for my presentation; it appears on the app, but seemingly not the website... For reference, they are:

Links
Source Code (wasm)
Source Code (web)
Slides
Sokoban Fuzzer

I'll be changing out the sokoban puzzle every 30 minutes from hereon out :)

#39c3 #fuzzing

hubertfhubertf
2025-12-27

Very cool talk on fuzzers - reminds me of what the angr community does:

events.ccc.de/congress/2025/hu

2025-12-27

From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines:

(paper) arxiv.org/pdf/2512.18102
(project) github.com/KKGanguly/DataCentr

#fuzzing #vulnerability #javascript #exploitation #llm

From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines
Alexandre Borgesalexandreborges
2025-12-27

From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines:

(paper) arxiv.org/pdf/2512.18102
(project) github.com/KKGanguly/DataCentr

From Coverage to Causes: Data-Centric Fuzzing for JavaScript Engines
Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2025-12-26

AFL++ 4.35c release! Complete hidden coverage gathering, GUIFuzz++ support, IJON for qemu, various fixes! github.com/AFLplusplus/AFLplus #fuzzing #fuzzer

N-gated Hacker Newsngate
2025-12-17

SQLite's process is like a buffet of , offering everything from to 🍽️. It's a wonder they didn't list "testing the patience of readers" among their rigorous methods. Maybe next time they'll just use the tried-and-true "cross your fingers and hope for the best" approach 🤞.
sqlite.org/testing.html

danzindanzin
2025-12-15

There's a researcher, Jiang Yuancheng, who's doing a great work finding CPython crashes and memory leaks: github.com/python/cpython/issu

They've come up with a very clever idea for a new way of fuzzing, made a fine tool out of it, and are reaping great results.

Fuzzing can be a diminishing returns endeavor: you only have so many bugs to find. Their approach has shown itself to cover different areas and kinds of issues well, as shown by their track record.

kriware :verified:kriware@infosec.exchange
2025-12-02

Kernel fuzzing on Mac with syzkaller

Guide to build a VM, add a vulnerable driver and crash it using syzkaller from macOS.

slava-moskvin.medium.com/fuzzi

#fuzzing #kernel

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst