Josh Bundt

409 posts

Josh Bundt

Josh Bundt

@DynaWhat

Katılım Ocak 2011
164 Takip Edilen83 Takipçiler
Josh Bundt
Josh Bundt@DynaWhat·
@wclaymoody At least this isn't my son's favorite numerical sighting these days!
English
0
0
0
6
W. Clay Moody
W. Clay Moody@wclaymoody·
The score only held for a few minutes but it was leet while it lasted. Trevor is showing off today.
W. Clay Moody tweet media
English
1
0
3
57
Josh Bundt retweetledi
Shellphish
Shellphish@shellphish·
Introducing ARTIPHISHELL! An LLM-Based Cyber Reasoning System made by @shellphish that autonomously finds and patches vulnerabilities for the @DARPA AIxCC competition (support.shellphish.net)
Shellphish tweet mediaShellphish tweet mediaShellphish tweet media
English
3
44
181
25.4K
Josh Bundt retweetledi
Keagan Stiefel
Keagan Stiefel@KeaganStiefel·
I’ve never experienced anything like #ArmyNavy. This is an unbelievable atmosphere.
English
52
188
942
135.4K
Josh Bundt retweetledi
Daniel Moghimi
Daniel Moghimi@flowyroll·
Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel - Practical to exploit (POC/Demo) - Defeat all isolation boundaries (OS, VM, SGX) - Bypass all Meltdown/MDS mitigations. downfall.page
GIF
English
16
376
953
228.5K
Josh Bundt retweetledi
Abhishek Arya
Abhishek Arya@infernosec·
Open Source Insights and OSS-Fuzz are now interconnected. You can see an OSS-Fuzz project's fuzzing coverage (Code coverage, configuration, etc) right inside deps.dev. Read more at blog.deps.dev/oss-fuzz/
English
0
15
35
5.3K
Josh Bundt retweetledi
Abhishek Arya
Abhishek Arya@infernosec·
6 yrs since @Google OSS-Fuzz started, reached 850 projects, fixed 8,800 vulns & 28,000 stability bugs & next we are bumping up OSS-Fuzz rewards: more reward categories for improving coverage and horizontal leet rewards for impacting hundreds of projects - security.googleblog.com/2023/02/taking…
English
1
50
257
35K
Josh Bundt retweetledi
Oliver Chang
Oliver Chang@halbecaf·
The OSS-Fuzz and FuzzBench team is helping to run the SBFT'23 fuzzing competition this year! sbft23.github.io/tools/fuzzing Please submit an entry if you're interested in participating! Entries for expressing interest close on Jan 13.
English
4
21
68
28K
Josh Bundt retweetledi
nedwill
nedwill@NedWilliamson·
A couple months overdue, here's the open source release of Concurrence, my new fuzzing library for thread-based targets. Integration code to SockFuzzer, plus Mach process/IPC/VM/etc. support are coming soon. Check it out at github.com/googleprojectz…
English
5
62
239
0
Brendan Dolan-Gavitt
Brendan Dolan-Gavitt@moyix·
Suppose I wanted to get a rough sense of which (statically linked) programs did the most "floating point stuff" using SSE. Is grepping the disassembly for xmm[0-9] and dividing by the total number of instructions a reasonable approach?
English
9
0
15
0