By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
How to Test Embedded Systems Security Easily with Mayhem
In this blog post, we will demonstrate how Mayhem can be used to easily set up fuzzing campaigns in embedded systems, using IoTGoat’s dnsmasq as an example.
CVE-2024-28578: Test Third-Party Image Libraries With Mayhem
Learn how to test third-party image libraries with Mayhem, using CVE-2024-28578 - an exploitable vulnerability in the FreeImage library - as an example.
Building a Time Machine: Testing Debian Packages Across Time
In this blog post, we’re going to attempt to use Debian and its packages to build a mini time machine and investigate the vulnerability of packages across time.
In this five minute tutorial, we'll use Mayhem to generate a Proof-of-Concept (POC) exploit for a buffer overflow using a tiny C program as our running example.
I was recently asked to help a customer with a code base that uses Maven. In this blog post, I’ll show you my process for addressing it and how you can too.