Using DynamoRIO to trace function calls for binaries with .pdb symbols
Another fun weekend project I made recently.
Another fun weekend project I made recently.
Fun weekend project I made lately.
This article is my submission for https://pagedout.institute #3 (UPD: Finally released December 2023) One day a friend of mine @xina1i asked on the chat if anyone fuzzed .hlp files. I quickly ...
Hi all, this is my quick write-up for Re01 challenge in WhiteHat Grand Prix 06 – Quals [1] We’re given by output.png and whitehat.exe [2]. The logic of whitehat.exe can be simplified to next steps...
Image parsers I was originally looking what I can fuzz inside of LINE.exe [1]. We can notice jpeg, ico and gif dll handlers in imageformats directory. 12/15/2019 17:51 <DIR> . ...
I found binary bug bounty opened on windows executable called Line [1]. But the binary is packed, so the first thing to do is to unpack it. Click me  Cl...
Another pretty interesting atricle I wrote as a part of Apriorit - How to Detect Vulnerabilities in Software When No Source Code Is Available. The first part is somewhat marketing wording, but pra...
Pretty cool atricle I wrote as a part of Apriorit - Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing