#Fuzzing

danzindanzin
2025-12-15

There's a researcher, Jiang Yuancheng, who's doing a great work finding CPython crashes and memory leaks: github.com/python/cpython/issu

They've come up with a very clever idea for a new way of fuzzing, made a fine tool out of it, and are reaping great results.

Fuzzing can be a diminishing returns endeavor: you only have so many bugs to find. Their approach has shown itself to cover different areas and kinds of issues well, as shown by their track record.

kriware :verified:kriware@infosec.exchange
2025-12-02

Kernel fuzzing on Mac with syzkaller

Guide to build a VM, add a vulnerable driver and crash it using syzkaller from macOS.

slava-moskvin.medium.com/fuzzi

#fuzzing #kernel

danzindanzin
2025-11-23

It turns out that, by running it on an interpreter with ASan enabled, I was the culprit of my fuzzer lafleur using way too much memory.

That even led to me buying some DDR5 to be able to fuzz a bit more comfortably. Running without ASan reduces memory usage to 1/15. So I guess now I'll have some spare RAM, and less money, going forward :)

I'll enhance the JIT fuzzer to run on a different interpreter than the fuzzing scripts, which benefit from ASan.

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2025-11-12

LibAFL 0.15.4 has just been released ๐ŸŽ‰

Of the 30 Contributers for this release, almost half are new faces <3

github.com/AFLplusplus/LibAFL/

#Fuzzing #LibAFL #AFLplusplus

Alexandre Dulaunoyadulau@infosec.exchange
2025-11-07

py5sig build automatically 5G signalling messages and fuzz SBI interfaces

Pretty cool stuff seen at the @UYBHYS workshop

#5g #fuzzing #opensource #cybersecurity

๐Ÿ”— github.com/ANSSI-FR/py5sig

โš ๏ธ๐ŸŽญYggdr4sฤซl๐ŸŽญโš ๏ธBlackHunters
2025-11-04

๐Ÿš€ ๐—™๐—น๐—ฎ๐˜€๐—ต๐—™๐˜‚๐˜‡๐˜‡ โ€“ Una herramienta rรกpida y ligera para investigadores y pentesters. ๐Ÿ•ต๐Ÿฝโ€โ™‚๏ธ

Fuzzear URLs y detectar secretos directamente desde tu navegador nunca fue tan fรกcil.
Explora endpoints ocultos y claves sensibles en segundos, sin usar la terminal.

- Ideal para quienes buscan reconocimiento inmediato y eficiencia.

๐Ÿ”— github.com/Ademking/FlashFuzz

2025-10-29

I am happy to share that our paper deepSURF has been accepted to IEEE S&P 2026!

This effort was led by my student George Androutsopoulos (linkedin.com/in/gandrout/).

deepSURF combines the use of program analysis and LLMs to uncover memory safety bugs in Rustโ€™s unsafe code.

You can check out the code and the paper here:

github.com/purseclab/deepSURF

arxiv.org/abs/2506.15648

#Rust #Security #ProgramAnalysis #LLM #Fuzzing #Purdue

danzindanzin
2025-10-27

So someone found a segfault in NumPy and reported it as a security bug: huntr.com/bounties/49928a2c-c6. After some back and forth, the NumPy developers agreed it was a security bug (with a low score, but still).

However, since fusil had already found that crash and I had reported it 2 months earlier (github.com/numpy/numpy/issues/), the report was deemed a duplicate and no CVE was assigned.

We didn't find a CVE, but avoided one :)

Link to fix: github.com/numpy/numpy/pull/30

danzindanzin
2025-10-27

Fuzzing pyhacl (codeberg.org/drlazor8/pyhacl), a package of Cython bindings for HACL* (the High Assurance Cryptographic Library), with fusil we only found one crash.

It turned out to actually be a silly bug in :

Issue: github.com/cython/cython/issue

Fix: github.com/cython/cython/pull/

Goes to show how fuzzing a C-extension can uncover crashes in many different layers.

Thanks @drlazor8 for taking up the call for C-extensions maintainers to fuzz their code.

danzindanzin
2025-10-26

After a pause, we're back to running fusil. This time, to fuzz cereggii, a package of very interesting thread synchronization utilities for , made of C-extensions.

We tailored to target these utilities, finding more issues.

Daniele Parmeggiani (dpdani), the maintainer, has been helping in the effort and being very supportive. That's the best welcome fusil has received in any project :)

Here are the issues we found: github.com/dpdani/cereggii/iss

danzindanzin
2025-10-25

Been running a fusil campaign for a week, targeting a C-extension. The fuzzer has found 9 issues so far, feels good.

The maintainer is helping with the campaign and eager to fix the issues, which is great.

Some maintainers see us with suspicion and often disregard issues, as if we're after accolades, pointing fingers or complaining about the code.

We fuzz to help, that's all.

Anyway, if you have a C-extension and would like it fuzzed, hit me up :)

Riley S. Faelanriley@toot.cat
2025-10-21

The process by which the Church of Scientology gained IRS recognition as a religion is best described as a #fuzzing attack on the legal system.

#infosec #lawsec

kjaerulvKjaerulv
2025-10-20

'China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a "premeditated" cyber attack targeting the National Time Service Center (NTSC), as it described the U.S. as a "hacker empire" and the "greatest source of chaos in cyberspace."

thehackernews.com/2025/10/mss-

2025-10-15
[RSS] Lucid Dreams II: Harness Development

https://h0mbre.github.io/Lucid_Dreams_2/

#fuzzing
danzindanzin
2025-10-13

lafleur, the CPython JIT fuzzer, now can compare timings for running a piece of code with JIT on and off.

The idea is that if the run with JIT on is much slower that with JIT off, we have found a performance bug.

Brandt Bucher suggested this mode. It took a while to get started on it, but it was simple to implement on top of Differential Mode.

So many modes, so little compute available...

Screen shot of an abridged log of lafleur running, displaying the new messages for the timing fuzzing mode:
[TIMING] Running timed trial with JIT=False.
[TIMING] Running timed trial with JIT=True.
  [~] Timing slowdown ratio (JIT/non-JIT) is 0.881.

The screen shot has a dark gray background and the text is a mix of white, green, red, purple and yellow, in a mess of coloring because the text editor identified this content as a Python script.

Full text of the image is:
--- Fuzzing Session #226 ---
[+] Calculating corpus scores for parent selection...
[+] Selected parent for BREADTH session: 523.py (Score: 248.51)
[...]
[TIMING] Running timed trial with JIT=False.
[TIMING] Running timed trial with JIT=True.
[NEW RELATIVE EDGE] '('EXECUTING', '_START_OF_HARNESS_->_SET_IP')' in harness 'f1'
  [~] Timing slowdown ratio (JIT/non-JIT) is 0.881.
Marcel SIneM(S)USsimsus@social.tchncs.de
2025-10-12
danzindanzin
2025-10-11

Differential Mode has just landed in lafleur, the CPython JIT fuzzer. It runs the same code with and without the JIT, compares the result, and flags any discrepancies.

It does this while mutating the code in a feedback-guided loop, so it evolves the fuzzing scripts trying to find one where the JIT gives wrong results.

This is actually the 2nd time this feature is implemented (now better and more robust): it used to work, broke, and now is back.

kriware :verified:kriware@infosec.exchange
2025-10-11

The Debugging Book

Interactive guide exploring automated debugging, testing, and program repair with Python examples for researchers and developers.

debuggingbook.org/

#Fuzzing #Testing

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst