Skip to content

Vulnerability Research – Null pointer dereference in Curl

The heart of the vulnerability lies within the code of the idn module, where the function idn_decode…

The Art of Fuzzing – Smart Contracts

In this article, we explore the fascinating world of smart contract auditing and vulnerability detec…

The art of fuzzing: Windows Binaries

Author: 2ourc3 Introduction Today we are gonna dive into grey-box fuzzing by testing closed source W…

The art of Fuzzing: Introduction.

This fuzzing introduction cover all the essentials one should know about the art of fuzzing. It expl…