FuzzingLabs at OWASP AppSec Days France 2025​

FuzzingLabs at OWASP AppSec Days France 2025​

OWASP AppSEC days france FuzzingLabs at OWASP AppSec Days France 2025 We’re excited to announce that FuzzingLabs will be present and sponsoring OWASP AppSec Days France 2025! This yearly event brings together security experts, researchers, and developers to share knowledge on the latest in application security. Our team will be on-site to discuss cutting-edge topics…

RingZer0 - Applied AI/LLM for Android APK Reversing and Analysis
| | | | |

RingZer0 2025 – Applied AI/LLM for Android APK Reversing and Analysis

RingZer0 2025 – Training Announcement Applied AI/LLM for Android APK Reversing and Analysis Unlock the next level of Android security analysis in our hands-on AI-Augmented Reverse Engineering training. You will learn to wield both local and online Large Language Models to accelerate decompilation, automate Frida script generation, and supercharge your workflow in Jadx and Ghidra….

Introduction to KVM & Hardware Virtualization​
| |

Introduction to KVM & Hardware Virtualization​

Hardware virtualization Introduction to KVM & Hardware Virtualization Virtualization has become a huge part in production environments, in traditional IT or in the cloud, improving security, development cycles and maintenance. This technology is the cornerstone that allows us to build isolated sandboxes, drastically shorten the time it takes to provision new servers, and perform hardware…

solana sol-azy sat static analyzer
| | |

Introducing Solazy – A Solana Static Analyser & Reverse Engineering tool

Solana Static analyzer Introducing sol-azy: A CLI Toolkit for Solana Program Static Analysis & Reverse Engineering This post dives into sol-azy, our new all-in-one toolkit for security research. Helping in reversing, analyzing, and poking at Solana programs statically, surgically, and on your terms. You can clone it from our GitHub https://github.com/FuzzingLabs/sol-azy What Problem Does sol-azy…

Benchmarking LLMs agents for vulnerability research​
| | |

Benchmarking LLMs agents for vulnerability research​

applied AI for Cybersecurity Benchmarking LLM agents for vulnerability research AI agents appear to be a powerful tool for advancing vulnerability research and securing modern applications. At FuzzingLabs, we decided to take a deep dive into this topic to assess its real-world potential. We conducted experiments by building AI agents using various LLMs, with the…

Vulnerable Ollama Instances – Is Your Ollama Server Publicly Exposed?​
| | |

Vulnerable Ollama Instances – Is Your Ollama Server Publicly Exposed?​

Vulnerable Ollama instances Is Your Ollama Server Publicly Exposed? In recent months, the rapid adoption of AI model serving tools like Ollama has transformed how developers and researchers deploy and interact with large language models locally. Ollama exposes a simple HTTP API—by default on port 11434—to manage, run, and query/infer language models such as LLaMA…

AI Agents for application security testing
| | |

AI Agents for application security testing

applied AI for Cybersecurity AI Agents for application security testing What if AI could autonomously find, trace, and exploit vulnerabilities in code? The rise of AI agents has opened many new possibilities, but one remains underexplored in security: combining static and dynamic testing in a unified, autonomous pipeline. Today’s app-sec solutions typically focus on either…

Android and the mysteries of dial codes ​ – Extracting dial codes by apk reversing
| | | | |

Android and the mysteries of dial codes ​ – Extracting dial codes by apk reversing

Android and the mysteries of dial Codes Extracting dial codes by apk reversing Dial Codes, also called USSD or HMI (Human Machine Interface) codes, are typically used by OEM and carrier to implement some menu. While making baseband researches, those hidden menus was very useful. Today, in this small blogpost, I will described the way…

POC 2025 Reversing Modern Binaries: Practical Rust & Go Analysis Training by FuzzingLabs
| | | | |

PoC 2025 – Reversing Modern Binaries: Practical Rust & Go Analysis On-site Training

POC 2025 – Training Announcement Reversing Modern Binaries: Practical Rust & Go Analysis Training Dive into the world of Rust and Golang reverse engineering at ReCon 2025! Join Daniel Frederic and Nabih Benazzouz for this exclusive 3-day training. You will learn how to analyze binaries, tackle obfuscation, and reverse-engineer malware written in two of the most…

Pairing-Based Cryptography Demystified: A Deep Dive into Elliptic Curves
| |

Pairing-Based Cryptography Demystified: A Deep Dive into Elliptic Curves

Unlocking Pairing-Based Cryptography with Elliptic Curves Pairing-Based Cryptography Demystified: A Deep Dive into Elliptic Curves Elliptic curves are central to modern cryptography, offering efficient, secure systems with smaller key sizes compared to traditional methods like RSA. But before diving into what they do, it’s helpful to understand what they are. Elliptic curves are mathematical objects…