Fuzzing_in
@fuzzing_in
fuzzing and security videos. YouTube: http://youtube.com/@MrHardik05 🚀 If you enjoy bymeacoffee: https://www.buymeacoffee.com/fuzzing_in 🚀
You might like
Unlock a 10% discount on our fuzzing course with coupon code FREEDOM. Discover more here: fuzzing.podia.com/mastering-fuzz…
Excited to be back at TyphoonCon2025.
Happy to announce our first #TyphoonCon25 training! "Hands-On Fuzzing: Identifying Vulnerabilities Across Linux and Windows Platforms" by @hardik05 typhooncon.com/blog/conitems/…. Stay tuned for more!
Registrations for my upcoming training on fuzzing at @BlackHatEvents has begin: blackhat.com/asia-25/traini… #BHASIA Register now, if you want to learn how to fuzz real world software on Linux and Windows, How to do crash analysis and triage and how fuzzer works and modify them!
Recording: Basics of fuzzing - Beginner Edition, no edits 🤓 youtube.com/live/9PQ_QTQJa…
youtube.com
YouTube
Fuzzing for vulnerability - Beginner Edition
i will be doing a live stream on basics of fuzzing for beginners next saturday 10AM IST: youtube.com/live/9PQ_QTQJa…
youtube.com
YouTube
Fuzzing for vulnerability - Beginner Edition
Super excited to be part of #poc2024 , if you want to learn how to fuzz software on Linux and Windows, you can register for my in person training at Seoul, South Korea in November 24.
If you are interested in learning more about fuzzing, We just launched our first course on Linux fuzzing, use coupon code 1337 and get 10% off: linkedin.com/posts/fuzzing-…
linkedin.com
Learn linux fuzzing with code 1337 | Fuzzing_in posted on the topic | LinkedIn
Hello Everyone, We just published our first course, it covers linux fuzzing. use code 1337 to get 10% discount. you will get access for 365 days. Mastering Fuzzing - A Hands-On Learning Experience...
Still few months left, you can register for my @defcon training on fuzzing here: training.defcon.org/products/pract… #fuzzing #training
If you work as a security researcher on detection side, you need to generate pcap for CVEs which sometime is a time consuming or boring task. in this video i show you how to automate this task with #nuclei and python and generate #pcaps for various CVEs: youtube.com/watch?v=-S__2z…
youtube.com
YouTube
Automating CVE PCAP Generation with Nuclei
Demystifying CVE-2024-3094: Understanding, Replicating, and Generating X... youtu.be/amnhFJEUwYs?si… via @YouTube #liblzma #xzbackdoor #sshdbackdoor
youtube.com
YouTube
CVE-2024-3094: Understanding, Replicating, and Generating pcap for...
🚨 Don't miss our latest video discussing the critical CVE-2024-21413 vulnerability in Microsoft Outlook! Learn how attackers can exploit this bug to compromise your credentials and execute remote code. Watch now : (youtu.be/HPQejiADXtA) #Cybersecurity #OutlookSecurity
youtube.com
YouTube
Microsoft Outlook CVE-2024-21413 Vulnerability: Protecting Your...
#outlook #ntlmleak just adding ! next to smb file path will make windows try to access that file :) if you directly access file it wont access. nice find by @HaifeiLi .. read the blog here: research.checkpoint.com/2024/the-risks…
new video, Exploiting Jenkins CVE-2024-23897: Remote Code Execution using #vulhub and #nuclei, youtu.be/DYu8u6N4QNM
youtube.com
YouTube
Exploiting Jenkins CVE-2024-23897: Remote Code Execution | Step-by-...
How to use vulhub - Dockerized Vulnerability Replication youtu.be/z0W3tfNQ-XQ #docker #vulhub #tutorial
youtube.com
YouTube
How to use vulhub - Dockerized Vulnerability Replication
Last few days, if you want to register for my fuzzing training at @defcon Hardik Shah - Mastering Fuzzing A Comprehensive Training on Identifyin – #defcontrainings #fuzzing #training #infosec training.defcon.org/products/hardi…
🔍 Learn snapshot fuzzing with #WTF Fuzzer! 🎥 Discover how to set up kernel debugging, use Windbg & Bdump.js to capture snapshots, write a harness, and fuzz a C program. #SnapshotFuzzing #WTFfuzzer #Fuzzing #cybersecuritytraining click here: bit.ly/46jIOvM
What you prefer for training course
🔒 Join me at @defcon for a 2-day fuzzing training on August 14-15th! 🎯 Discover how fuzzers work, learn root cause and crash triage, and Learn to fuzz popular software. Register now for an immersive learning experience: training.defcon.org/products/hardi… #DEFCON31 #FuzzingTraining
#libAFL is an open-source #fuzzing library used to identify vulnerabilities in software by generating inputs that trigger unexpected behavior. bit.ly/3JDiEux bit.ly/3JErVTe bit.ly/3laBuzX bit.ly/3ZMa6Y5 bit.ly/3ZJZokX
United States Trends
- 1. #AEWDynamite 17.2K posts
- 2. #Survivor49 2,803 posts
- 3. #SistasOnBET 2,026 posts
- 4. #iubb 1,690 posts
- 5. #ChicagoFire 1,371 posts
- 6. Binnington 2,037 posts
- 7. Athena 11K posts
- 8. Godzilla 29.1K posts
- 9. Savannah 5,285 posts
- 10. Mitchell Robinson 1,128 posts
- 11. Kent State 1,277 posts
- 12. Ovechkin 7,041 posts
- 13. Randle 3,223 posts
- 14. Unplanned 4,323 posts
- 15. Harley 11.4K posts
- 16. Cade Cunningham 2,422 posts
- 17. Ball State 1,855 posts
- 18. Andi 9,523 posts
- 19. Will Richard 3,222 posts
- 20. Claudio 48.6K posts
You might like
-
Interrupt Labs
@InterruptLabs -
seal
@seal9055 -
Moshe Kol
@0xkol -
sam4k
@sam4k1 -
Bee Gagliardi 🐝
@securibee -
lukas seidel
@pr0me -
Alexander Popov
@a13xp0p0v -
OWASP Amass
@owaspamass -
FuzzingLabs
@FuzzingLabs -
KevinLu
@K3vinLuSec -
Zhenpeng Lin
@Markak_ -
clearbluejar
@clearbluejar -
Hardik Shah
@hardik05 -
Seth Jenkins
@__sethJenkins -
d3d aka dead (dead, мёртв, 死了)
@deadvolvo
Something went wrong.
Something went wrong.