Vulnerable Codes - Security Code Review Platform
Master secure coding through hands-on code review challenges
Recently learned about vulnerable.codes, a site that teaches you code auditing. Nice to see more educational platforms popping up. Currently, it's heavily supported with challenges from @xenokovah.bsky.social and OST2 but if it keeps expanding even beyond C/C++ it could be very nice :)!
03.04.2025 07:51 β π 6 π 1 π¬ 0 π 0
$600 is crazy tho π₯²
03.04.2025 07:46 β π 1 π 0 π¬ 0 π 0
AIScholar - Paper Database
aischolar.0x434b.dev Pretty cool project by @434b.bsky.social: A neat web interface to explore security (and in particular: Fuzzing) papers with AI summaries. Seems super useful to get/stay up to date with recent papers :)
04.02.2025 15:29 β π 10 π 6 π¬ 0 π 0
GitHub - 0xricksanchez/AFL_Runner: Scaling best-practice AFLPlusPlus fuzzing campaigns made easy
Scaling best-practice AFLPlusPlus fuzzing campaigns made easy - 0xricksanchez/AFL_Runner
github.com/0xricksanche... just got more rusty, stable, (hopefully) easier to maintain and contribute to. Also, we have a bunch of new features like deterministic generation and fuzzing modes :)!
21.11.2024 10:48 β π 18 π 5 π¬ 0 π 0
Hello world
31.10.2023 19:09 β π 3 π 0 π¬ 0 π 0
Security Researcher | Pwn2Own 2018, 2021, 2022, 2024 | Posts about 0day, OS, mobile and embedded security.
Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
Autonomous Carbon Based LLM with 42 years of tuning on Information Attack and Defense.
Host of CanSecWest, and PacSec.
Security audits, code, IR, LLM, red team consulting.
Specialize in Firmware, and RF.
VA7MOV
ΙΏΙΙniΟ±nΙ ΙΖ¨ΙΏΙvΙΙΏ
π¦ youtube.com/@jiskac
π naehrdine.blogspot.com
π₯ twitter.com/naehrdine
π hpi.de/classen
π± reversing.training
Security Engineer @ Cloudflare,
ex-Google ISE,
I use bad software and bad machines for the wrong things.
My writing: https://carstein.github.io
Security researcher with an interest in formal methods.
Building fuzzers @ Interrupt Labs |
Teaching @ Australian National University
https://adrian-herrera.com
We want to make fuzzing better and better
Follow for updates on AFL++ & LibAFL
Security @Google, Personal Account.
fuzzing enjoyer
@novafacing@haunted.computer
https://binary.ninja/
Made with β€οΈ by https://vector35.com/
Firmware Security β’ Embedded Systems β’ AI x Infosec β’
Researcher @binarly β’ PhD Candidate @TUBerlin β’
Capturing Flags with ENOFLAG
android/linux kernel @ Vigilant Labs | ctfs (pwn) w/ CoR + ELT
Paged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other similar topics. Always accepting submissions of one-page articles.
Fuzzing & stuff https://hexgolems.com
Cyber Response Italian Supercazzola Technology Officer at
@mhackeroni Inc. Writing your favourite fuzz testing tools with
@aflplusplus. Security research at ο£Ώ.
Someone who likes debuggers a bit too much
π¨π¦ β’ π°π· β’ π«π·
Binary Ninja dev, Cuber, EUC rider.
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.