BGP Under Pressure : Protocol Fuzzing in action
| |

BGP Under Pressure : Protocol Fuzzing in action

BGP Under Pressure Protocol Fuzzing in action When it comes to keeping the internet running smoothly, the Border Gateway Protocol (BGP) is absolutely essential. BGP is the backbone of how routers share the best paths for data across different networks. Given its importance, even small bugs can cause big headaches. That’s why we’ve been busy…

Breaking Down the Baseband​ : Shannon in a nutshell
| | | |

Breaking Down the Baseband​ : Shannon in a nutshell

Breaking Down the Baseband Shannon in a nutshell Over the past 30 years, technology has revolutionized communications. Mobile phones, now owned by about 80% of people worldwide, have become our constant companions and the most widely adopted innovation after television. These devices rely on complex network standards implemented through specialized processors. Like all software, this…

How Fuzzing Could Have Prevented the zkLend Hack​
| | | |

How Fuzzing Could Have Prevented the zkLend Hack​

rediscovery of the starknet zklend hack How Fuzzing Could Have Prevented the zkLend Hack The recent zkLend hack has stirred up significant discussion in the community, and today we’d like to share some insights from our deep dive into the vulnerability using fuzzing techniques at FuzzingLabs. Our investigation reveals that a simple fuzzing test could…

Recon Reversing Modern Binaries: Practical Rust & Go Analysis Training by FuzzingLabs
| | | | |

Recon 2025 – Reversing Modern Binaries: Practical Rust & Go Analysis On-site Training

REcon 2025 – Training Announcement Reversing Modern Binaries: Practical Rust & Go Analysis Training Dive into the world of Rust and Golang reverse engineering at ReCon 2025! Join Daniel Frederic and Mathieu Hoste for this exclusive 4-day training. You will learn how to analyze binaries, tackle obfuscation, and reverse-engineer malware written in two of the…

Recon Fuzzing Windows Userland Applications Training by FuzzingLabs
| | | | |

Recon 2025 – Fuzzing Windows Userland Applications On-site Training

REcon 2025 – Training Announcement Fuzzing Windows Userland Applications Training Master the art of uncovering vulnerabilities in Windows applications with our in-depth Windows Fuzzing training at ReCon 2025! This hands-on course will guide you through the fundamentals of fuzzing, advanced techniques like grammar-based and symbolic execution, and real-world applications targeting browsers, antivirus software, and more….

Rust development for cybersecurity at Recon 2025 by FuzzingLabs
| | | | |

Recon 2025 – Rust Development for Cybersecurity On-site Training

REcon 2025 – Training Announcement Rust Development for Cybersecurity Training Dive into the world of cutting-edge cybersecurity tools with our exclusive Rust Development for Cybersecurity Training! Led by experts Matthieu Christophe and Tanguy Duhamel, this hands-on program will equip you with advanced Rust techniques to build defensive and offensive security tools, unlocking your potential to…

Story Security Assessment Completed
| | | | |

Story Security Assessment Completed

Story / Security Assessment Completed Strengthening Blockchain-Based IP Management At FuzzingLabs we recently completed a comprehensive security assessment of Story, a decentralized network that aims to revolutionize intellectual property (IP) management. This audit was undertaken to ensure the security and resilience of its blockchain-based infrastructure, smart contracts, and consensus mechanisms. Below, we provide an overview…

DOS in DeFi Liquidity Pools: The Initialization Vulnerability
| | |

DOS in DeFi Liquidity Pools: The Initialization Vulnerability

Denial Of Service in DeFi Liquidity Pools The Initialization Vulnerability Decentralized Exchanges (DEXs) have become a cornerstone of the DeFi ecosystem, processing billions in daily trading volume. However, during our recent security research at FuzzingLabs we uncovered a subtle yet significant vulnerability pattern that affects multiple DEX implementations. This vulnerability allows malicious actors to effectively…

offensivecon 2025 browser fuzzing binary gecko
| | | | | |

OffensiveCon 2025 – Practical Browser Fuzzing On-site Training

OffensiveCon 2025 – Training Announcement Practical Web Browser Fuzzing Training Kickstart your journey into the intricate world of web browser fuzzing at OffensiveCon 2025! This exclusive training, led by experts Patrick Ventuzelo and Tanguy Duhamel, is your opportunity to master advanced fuzzing techniques and uncover vulnerabilities in some of the most widely used software globally….

GreHack CTF – Casting reverse challenge into cryptanalysis challenge​
| |

GreHack CTF – Casting reverse challenge into cryptanalysis challenge​

Grehack ctf WRITEUP Casting reverse challenge into cryptanalysis challenge In mid-November, I participated in the GreHack CTF with my team (Phreaks 2600), and the challenge I will present was one of the problems featured in the competition. Interestingly, only two other teams managed to solve it, this makes it a particularly intriguing challenge, categorized under…