Maksim Shudrak (@mshudrak) 's Twitter Profile
Maksim Shudrak

@mshudrak

Offsec, Exploit/Malware Dev, Vuln Research, Tools Dev, RE

Opinions expressed are solely my own and do not express the views or opinions of my employer.

ID: 880120724429602816

linkhttps://github.com/mxmssh calendar_today28-06-2017 17:48:27

81 Tweet

838 Followers

116 Following

Andrea Fioraldi (@andreafioraldi) 's Twitter Profile Photo

I've just written a performant in-memory fuzzing module with Frida for AFL++ github.com/andreafioraldi…. Watch AFL++ on GH and stay tuned for a frida_mode in the next days!

I've just written a performant in-memory fuzzing module with <a href="/fridadotre/">Frida</a> for AFL++ github.com/andreafioraldi…. Watch AFL++ on GH and stay tuned for a frida_mode in the next days!
Maksim Shudrak (@mshudrak) 's Twitter Profile Photo

Just released Manul v 0.4, a lot of performance improvements and bug fixes. New features: - InApp coverage-guided blackbox fuzzing on both Windows (winAFL-like) and Linux. On Linux, it is the only tool that supports this type of fuzzing now :) - Added AFL forkserver (x10 speedup)

Richard Johnson (@richinseattle) 's Twitter Profile Photo

Just a reminder that I’ll be giving a keynote at FuzzCon RSA on Tuesday morning in SF. I’ll talk about history, modern adoption, and future challenges. There are about 120 attendees registered so it should be a great size for networking. Ping me for a free registration code.

Abhishek Arya (@infernosec) 's Twitter Profile Photo

After a decade of fuzzing, we just launched FuzzBench, a fuzzer benchmarking platform to bridge the gap between academic fuzzing research and industry fuzzing engines (e.g libFuzzer, AFL, Honggfuzz). github.com/google/fuzzben…

Tavis Ormandy (@taviso) 's Twitter Profile Photo

I have something fun for you, I pulled the javascript interpreter out of Avast and ported it to Linux 😆 This runs unsandboxed as SYSTEM, any vulns are wormable pre-auth RCE on 400M endpoints  ¯\_(ツ)_/¯ github.com/taviso/avscript 🐧

I have something fun for you, I pulled the javascript interpreter out of Avast and ported it to Linux 😆

This runs unsandboxed as SYSTEM, any vulns are wormable pre-auth RCE on 400M endpoints  ¯\_(ツ)_/¯

github.com/taviso/avscript 🐧
Maksim Shudrak (@mshudrak) 's Twitter Profile Photo

My article "Leveraging Coverage-Guided Fuzzing to Find Exploitable Bugs" was published by Pentest Mag pentestmag.com/product/pentes…

Kostya Serebryany (@kayseesee) 's Twitter Profile Photo

I'm still hiring! Looking for an engineering manager in Sunnyvale, CA, USA. Details: careers.google.com/jobs/results/8… (And happy new year everyone!)

Heather Adkins - Ꜻ - Spes consilium non est (@argvee) 's Twitter Profile Photo

Today we take you behind the scenes like never before, learn about the work Google's security experts do behind closed doors to keep billions safe every day. The HACKING GOOGLE docuseries is streaming NOW on YouTube → g.co/safety/Hacking…

Maksim Shudrak (@mshudrak) 's Twitter Profile Photo

Need to evaluate impact of leaked GCP credentials or VM compromise? We implemented a GCP Scanner to help with that! I am very excited to present GCP Scanner (github.com/google/gcp_sca…) w/ Jacob Butler at BlackHat Arsenal USA this year on August 10. blackhat.com/us-23/arsenal/…

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Buttercup won the $3M second prize at DARPA's AIxCC. We found 28 vulnerabilities across 20 CWEs with 90% accuracy at just $181/point, achieving this with exclusively non-reasoning LLMs.

Buttercup won the $3M second prize at DARPA's AIxCC. We found 28 vulnerabilities across 20 CWEs with 90% accuracy at just $181/point, achieving this with exclusively non-reasoning LLMs.