- How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities https://www.sentinelone.com/labs/inside-the-black-box-how-we-fuzzed-microsoft-defender-for-iot-and-found-multiple-vulnerabilities/ 4 comments reverseengineering
Linked pages
- Pwning Microsoft Azure Defender for IoT | Multiple Flaws Allow Remote Code Execution for All - SentinelOne https://www.sentinelone.com/labs/pwning-microsoft-azure-defender-for-iot-multiple-flaws-allow-remote-code-execution-for-all/ 2 comments
- GitHub - GJDuck/e9afl: AFL binary instrumentation https://github.com/GJDuck/e9afl 2 comments
- lcamtuf's old blog: Fuzzing random programs without execve() http://lcamtuf.blogspot.com/2014/10/fuzzing-binaries-without-execve.html 0 comments
- LABScon Replay: Exploits in Early Boot Phases (Pre-EFI) https://www.sentinelone.com/labs/labscon-replay-breaking-firmware-trust-from-the-other-side-exploiting-early-boot-phases-pre-efi/ 0 comments
Related searches:
Search whole site: site:sentinelone.com
Search title: Inside the Black Box | How We Fuzzed Microsoft Defender for IoT and Found Multiple Vulnerabilities - SentinelOne
See how to search.