Menu

In 5 steps, I will show you how to find a remote code execution vulnerability in an unreleased version of the  German Covid-19 tracing app (CWA), using feedback-based fuzz testing.

Abhishek Arya, who is currently Principal Software Engineer at Google, is one of the early...

Caroline Lemieux is a final-year PhD candidate, at the University of California, Berkeley. In...

Hand sanitizers are high in demand right now. Rightfully so! With an ongoing global pandemic,...

Jazzer is a coverage-guided fuzzer for the Java Virtual Machine (JVM). It works on the bytecode...

Watch the CI Fuzz Demo

Get an overview of our testing platform by watching our demo video. 

 

Christian Holler is Staff Security Engineer at Mozilla. Over the past ten years, he has gained...

Pentesting is an essential process to achieve good application security. There are many security...

Web Applications are growing increasingly complex, which makes tools for automated security...

If you or your team are working on projects in Java or C/C++, then I have great news for you:...

With cybercrime on the rise, the code quality and security is becoming more important than ever...

Many people believe that fuzzing is only useful for C/C++ code because they associate it mainly...

Since the outbreak of the COVID-19 pandemic, tracing apps have been discussed in order to better...

We often get asked by customers if SQL injections are still an issue? Even though this...

In recent years, modern fuzzing (feedback-based fuzzing) has uncovered a large number of bugs...

Executive Summary Software developers extend their existing frameworks and often write new...

Subscribe to our Newsletter!