toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

291
active users

#fuzzing

0 posts0 participants0 posts today
danzin<p>Posted a topic about lafleur, the CPython JIT fuzzer I'm developing: <a href="https://discuss.python.org/t/introducing-lafleur-a-cpython-jit-fuzzer/103452" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.python.org/t/introduci</span><span class="invisible">ng-lafleur-a-cpython-jit-fuzzer/103452</span></a></p><p>It has many details about the project, the results (4 JIT crashes so far), calls for help and ideas for the future.</p><p>If any of this interests you, please give a read. Boosts welcome :)</p><p><a href="https://mastodon.social/tags/lafleur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lafleur</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a> <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/JIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JIT</span></a></p>
Eric Eide<p>"Interns Gone Wasm."</p><p>Khan Karimov, my PhD student, talks about his summer internship work at F5 in this podcast. <a href="https://scholar.social/tags/webassembly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webassembly</span></a> <a href="https://scholar.social/tags/wasm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wasm</span></a> <a href="https://scholar.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://youtu.be/OhybI5aUy5M" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/OhybI5aUy5M</span><span class="invisible"></span></a></p>
danzin<p>Busy day, good day: the new CPython fuzzer lafleur found its first 2 crashes this morning! </p><p>Happiness only marred by the bad job I did reducing the testcases and making the reports reproducible. Thanks Brandt Bucher and and Ken Jin for the patience! Next bug reports will be more polished and reliable.</p><p>Also, we got 3 new PRs for the fuzzer but I didn't have time to review them, will have to leave that for tomorrow.</p><p><a href="https://github.com/devdanzin/lafleur/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/devdanzin/lafleur/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a> <a href="https://mastodon.social/tags/lafleur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lafleur</span></a></p>
danzin<p>Trying real hard to build a fuzzer targeting the CPython JIT, lots of features implemented but not a single crash or bug discovered so far.</p><p>Such is life when hunting for crashes in robust code.</p><p>This weekend I'll be spinning off a new fuzzer that grew from fusil. Wish me luck 🙂</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/JIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JIT</span></a> <a href="https://mastodon.social/tags/Fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fuzzer</span></a> <a href="https://mastodon.social/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fuzzing</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a> <a href="https://mastodon.social/tags/lafleur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lafleur</span></a></p>
danzin<p>So, what's next for fuzzing CPython with fusil?</p><p>The results point to interesting future ideas, including expanding fuzzing to new environments like subinterpreters, using more tools like Thread Sanitizer, and developing more advanced fuzzing techniques.</p><p>A huge thank you to everyone who contributed!</p><p>And thank you for reading!</p><p>P.S.: if you have a C/Rust extension, we can fuzz it too: <a href="https://mastodon.social/@danzin/114383188014599269" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@danzin/114383</span><span class="invisible">188014599269</span></a></p><p>(5/5)</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a></p>
danzin<p>One finding I really like is the bug discovery pattern.</p><p>There wasn't a steady stream of bugs, but spikes of findings: 1st, a huge number of crashes as I started testing a CPython that hadn't been fuzzed by fusil in a decade.</p><p>Later, a new wave of issues tied to the addition of new features to the fuzzer, like support for "weird classes" and typing objects.</p><p>So periodic campaigns may have better cost-benefit than continuous fuzzing.</p><p>(4/5)</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a></p>
danzin<p>The credit for fusil's effective design goes all to Victor Stinner (<span class="h-card" translate="no"><a href="https://mamot.fr/@vstinner" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vstinner</span></a></span>), who created it nearly two decades ago. It was responsible for finding release blockers way back in 2008. I just contributed a little to revive and enhance it. </p><p>Some enhancements included running generated code in threads and adopting new "interesting" objects and values as inputs, helping to discover more crashes.</p><p>(3/5)</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a></p>
danzin<p>All this was only possible due to the great response from the Python community.</p><p>Thanks to the developers efforts to triage, diagnose, and fix the problems, the campaign became a collaborative effort to improve Python.</p><p>The impact was considerable, mobilizing Core Devs and contributors to create 98 PRs to fix these bugs. The average time to fix an issue was about 20 days, with a median of just five days.</p><p>(2/5)</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a></p>
danzin<p>Happy to share the results of a fuzzing campaign targeting CPython that ran from Oct 2024 to May 2025. Using the fusil fuzzer, the goal was to find crashes and improve CPython's robustness.</p><p>I really like the results we got: the effort uncovered 52 unique crash-related issues. These reports approached 30% of all "type-crash" issues filed during that period. One of the crashes was classified as a Release Blocker, that was a nice result! :)</p><p>(1/5)</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a></p>
danzin<p>So, my technical report on fuzzing CPython with fusil is almost done.</p><p>I'd really appreciate some help categorizing the found issues by relevance/severity/importance or any other name for impact.</p><p>Do you have the chops to help with that? And do you have time and interest? Please get in touch if so! And please boost if you can :)</p><p>A plot, some tables, links to the report and some discussion are available in this thread:</p><p><a href="https://discuss.python.org/t/feedback-on-the-recent-fusil-fuzzing-campaign-of-cpython/91737" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.python.org/t/feedback-</span><span class="invisible">on-the-recent-fusil-fuzzing-campaign-of-cpython/91737</span></a></p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a></p>
LavX News<p>Exploiting Mach IPC Messages: A Deep Dive into MacOS Security Research</p><p>In an intricate exploration of MacOS security, Dillon Franke unveils his journey through fuzzing and vulnerability discovery, focusing on Mach IPC messages. This article dissects the methodology used ...</p><p><a href="https://news.lavx.hu/article/exploiting-mach-ipc-messages-a-deep-dive-into-macos-security-research" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/exploitin</span><span class="invisible">g-mach-ipc-messages-a-deep-dive-into-macos-security-research</span></a></p><p><a href="https://ioc.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://ioc.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://ioc.exchange/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fuzzing</span></a> <a href="https://ioc.exchange/tags/MachIPC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MachIPC</span></a> <a href="https://ioc.exchange/tags/MacOSSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MacOSSecurity</span></a></p>
buheratorTo join the recent series of great Windows Defender content (defendnot, EvilentCoerce) I published a status report on mpclient development:<br><br>Fuzzing Windows Defender with loadlibrary in 2025<br><br><a href="https://scrapco.de/blog/fuzzing-windows-defender-with-loadlibrary-in-2025.html" rel="nofollow noopener" target="_blank">https://scrapco.de/blog/fuzzing-windows-defender-with-loadlibrary-in-2025.html</a><br><br><a class="hashtag" href="https://infosec.place/tag/fuzzing" rel="nofollow noopener" target="_blank">#Fuzzing</a> <a class="hashtag" href="https://infosec.place/tag/reverseengineering" rel="nofollow noopener" target="_blank">#ReverseEngineering</a> <a class="hashtag" href="https://infosec.place/tag/antivirus" rel="nofollow noopener" target="_blank">#Antivirus</a>
danzin<p><a href="https://mastodon.social/tags/Fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fusil</span></a> works by generating source files with random calls, using interesting arguments, then monitoring their execution and output. It usually finds crashes resulting from the processing of invalid objects and unexpected call patterns.</p><p>Fusil was created by <span class="h-card" translate="no"><a href="https://mamot.fr/@vstinner" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vstinner</span></a></span>.</p><p>Features added by me include running generated code in parallel threads, testing class instances in addition to classes and functions, and using new interesting objects/values as inputs.</p><p><a href="https://github.com/issues/created?q=is%3Aissue%20author%3Adevdanzin%20-repo%3Adevdanzin%2Ffusil%20fusil%20%20sort%3Acreated-asc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/issues/created?q=is</span><span class="invisible">%3Aissue%20author%3Adevdanzin%20-repo%3Adevdanzin%2Ffusil%20fusil%20%20sort%3Acreated-asc</span></a></p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a></p>
danzin<p>Writing about <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a>. Some bits:</p><p>Fuzzing <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a> with fusil shows it to be a valuable tool for finding and fixing crashers. It started in October 2024 and is ongoing, using free tier cloud instances and personal computers.</p><p>Results:<br>- Fuzzing time: &gt; 25.000 hours<br>- Fuzzing sessions: &gt; 1.000.000 <br>- Hits: &gt; 50.000<br>- Issues filled: 52</p><p>The original design of fusil makes it well-suited for fuzzing CPython, finding both deep, relevant bugs as well as shallow, low value crashes.</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a></p>
Stefano Zacchiroli<p>My colleagues at CEA in <a href="https://mastodon.xyz/tags/Paris" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Paris</span></a>, France, are hiring a 2-year <a href="https://mastodon.xyz/tags/postdoc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postdoc</span></a> to work on the joint research project <a href="https://mastodon.xyz/tags/SECUBIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SECUBIC</span></a> about <a href="https://mastodon.xyz/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> binaries to identify <a href="https://mastodon.xyz/tags/backdoors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoors</span></a>. (See this recently joint work at <a href="https://mastodon.xyz/tags/ICSE2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICSE2025</span></a> for previous results: <a href="https://upsilon.cc/~zack/research/publications/icse-2025-rosa-fuzzing.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">upsilon.cc/~zack/research/publ</span><span class="invisible">ications/icse-2025-rosa-fuzzing.pdf</span></a> )</p><p>If you're interested, or know interested candidates, head to: <a href="https://secubic-ptcc.github.io/jobs/open/2025/04/02/postdoc-supply-chain-binary-fuzzing.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">secubic-ptcc.github.io/jobs/op</span><span class="invisible">en/2025/04/02/postdoc-supply-chain-binary-fuzzing.html</span></a> for details.</p><p><a href="https://mastodon.xyz/tags/getfedihired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>getfedihired</span></a></p>
danzin<p>Do you maintain or contribute to a <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> package that includes a C extension? Would you like to run a fuzzer against it?</p><p>If so, let me know and I will run it, or help you to get it running. </p><p>The fuzzer is <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fusil</span></a>, which generates random code calling into your functions and methods. It's useful to check for crashes on invalid inputs or unexpected call patterns.</p><p>It has found about 50 crashes in <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPython</span></a>, 20 in <a href="https://mastodon.social/tags/PyPy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PyPy</span></a>, 6 in <a href="https://mastodon.social/tags/Numpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Numpy</span></a> etc.</p><p><a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/testing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>testing</span></a><br>See here:<br><a href="https://github.com/devdanzin/fusil/issues/37" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/devdanzin/fusil/iss</span><span class="invisible">ues/37</span></a></p>
Karol Mazurek<p>How a simple <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> payload bypassed entitlement check and triggered a <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> panic on <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> in the IOMobileFramebuffer driver. Patched in 15.4. Enjoy!</p><p><a href="https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">afine.com/case-study-iomobilef</span><span class="invisible">ramebuffer-null-pointer-dereference/</span></a></p><p><a href="https://infosec.exchange/tags/RE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RE</span></a>, <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a> <a href="https://infosec.exchange/tags/PoC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoC</span></a></p>
Thor A. Hopland<p>What's happening in the <a href="https://snabelen.no/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> government right now seems like they're "<a href="https://snabelen.no/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://snabelen.no/tags/democracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>democracy</span></a>", that is overwhelming the system and the opposition in order to install autocracy.</p><p>The primary problem IMHO being that the <a href="https://snabelen.no/tags/constitution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>constitution</span></a> is still written in an antiquated form of <a href="https://snabelen.no/tags/English" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>English</span></a> which allows an <a href="https://snabelen.no/tags/elite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elite</span></a> class of specialized <a href="https://snabelen.no/tags/lawyers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lawyers</span></a> to interpret laws, and therefore be gatekeepers of law.</p><p>This is what idolization of documents gets you. At the very least update the phrasing to be more clear.</p>
Thor A. Hopland<p><a href="https://snabelen.no/tags/MediaFuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MediaFuzzing</span></a> is the tactic of overwhelming media with outright lies, bunk causes, statements and controversy in order to put the media and the general public into a state of disarray and confusion.</p><p><a href="https://snabelen.no/tags/Politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Politics</span></a> <a href="https://snabelen.no/tags/Trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trump</span></a> <a href="https://snabelen.no/tags/Project2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Project2025</span></a> <a href="https://snabelen.no/tags/Media" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Media</span></a> <a href="https://snabelen.no/tags/fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fuzzing</span></a> <a href="https://snabelen.no/tags/psyop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>psyop</span></a> <a href="https://snabelen.no/tags/democracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>democracy</span></a> <a href="https://snabelen.no/tags/liberty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liberty</span></a> <a href="https://snabelen.no/tags/unity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unity</span></a></p>
Karol Mazurek<p>🚀 New blog post! 🚀</p><p>Deep dive into a <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> IONVMeFamily <a href="https://infosec.exchange/tags/driver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>driver</span></a> Denial of Service issue! It is not a security risk but a great case study for macOS driver analysis.🕵️‍♂️</p><p>Enjoy!<br><a href="https://infosec.exchange/tags/RE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RE</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Research</span></a> <a href="https://infosec.exchange/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> <a href="https://infosec.exchange/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fuzzing</span></a> <a href="https://infosec.exchange/tags/PoC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoC</span></a></p><p><a href="https://afine.com/case-study-analyzing-macos-ionvmefamily-driver-denial-of-service-issue/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">afine.com/case-study-analyzing</span><span class="invisible">-macos-ionvmefamily-driver-denial-of-service-issue/</span></a></p>