lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

63
active users

#fuzzing

0 posts0 participants0 posts today
danzin<p>Another tidbit from the report I'm writing about <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fusil</span></a>:</p><p>The 52 issues filled correspond roughly to 30% of all the crashes (issues with "type-crash" label) and 2% of all issues (features requests, bugs and invalid issues) reported in the <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> issue tracker during the six months period covered by the report.</p><p>Hits and new issues don't appear at a steady pace. It seems that there are long periods of no or nearly no new issues, followed by rapid finding of new results.</p><p><a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a></p>
danzin<p><a href="https://mastodon.social/tags/Fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fusil</span></a> works by generating source files with random calls, using interesting arguments, then monitoring their execution and output. It usually finds crashes resulting from the processing of invalid objects and unexpected call patterns.</p><p>Fusil was created by <span class="h-card" translate="no"><a href="https://mamot.fr/@vstinner" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vstinner</span></a></span>.</p><p>Features added by me include running generated code in parallel threads, testing class instances in addition to classes and functions, and using new interesting objects/values as inputs.</p><p><a href="https://github.com/issues/created?q=is%3Aissue%20author%3Adevdanzin%20-repo%3Adevdanzin%2Ffusil%20fusil%20%20sort%3Acreated-asc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/issues/created?q=is</span><span class="invisible">%3Aissue%20author%3Adevdanzin%20-repo%3Adevdanzin%2Ffusil%20fusil%20%20sort%3Acreated-asc</span></a></p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
danzin<p>Writing about <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fusil</span></a>. Some bits:</p><p>Fuzzing <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> with fusil shows it to be a valuable tool for finding and fixing crashers. It started in October 2024 and is ongoing, using free tier cloud instances and personal computers.</p><p>Results:<br>- Fuzzing time: &gt; 25.000 hours<br>- Fuzzing sessions: &gt; 1.000.000 <br>- Hits: &gt; 50.000<br>- Issues filled: 52</p><p>The original design of fusil makes it well-suited for fuzzing CPython, finding both deep, relevant bugs as well as shallow, low value crashes.</p><p><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
Stefano Zacchiroli<p>My colleagues at CEA in <a href="https://mastodon.xyz/tags/Paris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Paris</span></a>, France, are hiring a 2-year <a href="https://mastodon.xyz/tags/postdoc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postdoc</span></a> to work on the joint research project <a href="https://mastodon.xyz/tags/SECUBIC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SECUBIC</span></a> about <a href="https://mastodon.xyz/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> binaries to identify <a href="https://mastodon.xyz/tags/backdoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoors</span></a>. (See this recently joint work at <a href="https://mastodon.xyz/tags/ICSE2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICSE2025</span></a> for previous results: <a href="https://upsilon.cc/~zack/research/publications/icse-2025-rosa-fuzzing.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">upsilon.cc/~zack/research/publ</span><span class="invisible">ications/icse-2025-rosa-fuzzing.pdf</span></a> )</p><p>If you're interested, or know interested candidates, head to: <a href="https://secubic-ptcc.github.io/jobs/open/2025/04/02/postdoc-supply-chain-binary-fuzzing.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">secubic-ptcc.github.io/jobs/op</span><span class="invisible">en/2025/04/02/postdoc-supply-chain-binary-fuzzing.html</span></a> for details.</p><p><a href="https://mastodon.xyz/tags/getfedihired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedihired</span></a></p>
danzin<p>Do you maintain or contribute to a <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> package that includes a C extension? Would you like to run a fuzzer against it?</p><p>If so, let me know and I will run it, or help you to get it running. </p><p>The fuzzer is <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fusil</span></a>, which generates random code calling into your functions and methods. It's useful to check for crashes on invalid inputs or unexpected call patterns.</p><p>It has found about 50 crashes in <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a>, 20 in <a href="https://mastodon.social/tags/PyPy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PyPy</span></a>, 6 in <a href="https://mastodon.social/tags/Numpy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Numpy</span></a> etc.</p><p><a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/testing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testing</span></a><br>See here:<br><a href="https://github.com/devdanzin/fusil/issues/37" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/devdanzin/fusil/iss</span><span class="invisible">ues/37</span></a></p>
Karol Mazurek<p>How a simple <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> payload bypassed entitlement check and triggered a <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kernel</span></a> panic on <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> in the IOMobileFramebuffer driver. Patched in 15.4. Enjoy!</p><p><a href="https://afine.com/case-study-iomobileframebuffer-null-pointer-dereference/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">afine.com/case-study-iomobilef</span><span class="invisible">ramebuffer-null-pointer-dereference/</span></a></p><p><a href="https://infosec.exchange/tags/RE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RE</span></a>, <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Research</span></a> <a href="https://infosec.exchange/tags/PoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoC</span></a></p>
Karol Mazurek<p>🚀 New blog post! 🚀</p><p>Deep dive into a <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> IONVMeFamily <a href="https://infosec.exchange/tags/driver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>driver</span></a> Denial of Service issue! It is not a security risk but a great case study for macOS driver analysis.🕵️‍♂️</p><p>Enjoy!<br><a href="https://infosec.exchange/tags/RE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RE</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/Research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Research</span></a> <a href="https://infosec.exchange/tags/Kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kernel</span></a> <a href="https://infosec.exchange/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a> <a href="https://infosec.exchange/tags/PoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoC</span></a></p><p><a href="https://afine.com/case-study-analyzing-macos-ionvmefamily-driver-denial-of-service-issue/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">afine.com/case-study-analyzing</span><span class="invisible">-macos-ionvmefamily-driver-denial-of-service-issue/</span></a></p>
danzin<p>We're up to 30 <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> crashers found using <a href="https://mastodon.social/tags/Fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fusil</span></a> this year, about 90% of them considered valid.</p><p>In 2008, I had reported 5 cases using the same <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a>, 4 of which were release blockers.</p><p><span class="h-card" translate="no"><a href="https://mamot.fr/@vstinner" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vstinner</span></a></span>, Fusil's creator, also reported a bunch of issues with it.</p><p>After running for a while (on free AWS and Oracle cloud tiers), crash hits are getting harder to find.</p><p>We need new fuzzing inputs. Feel free to suggest improvements that could find new crashers.</p><p><a href="https://github.com/devdanzin/fusil" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/devdanzin/fusil</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a></p>
postmodern<p>TIL there is an actual RFC for URL template syntax. Every web fuzzing tool should be using RFC 6570 instead of whatever bespoke syntax they came up with (looking at you wfuzz).<br><a href="https://datatracker.ietf.org/doc/html/rfc6570" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/html/</span><span class="invisible">rfc6570</span></a></p><p><a href="https://infosec.exchange/tags/rfc6570" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc6570</span></a> <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
Marcel Waldvogel<p>Ach ja: Kurzversion der Erkenntnisse und Versprechungen von <a href="https://waldvogel.family/tags/CrowdStrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CrowdStrike</span></a>: </p><p>1️⃣ Wir (das Internet und DNIP) lagen erstaunlich gut bei der Analyse der Ursachen<br>2️⃣ Sie setzen Etliches von dem um, was mein Artikel fordert: Bessere Tests (inkl. <a href="https://waldvogel.family/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a>) von Software, gründlichere Validierung der Daten beim Laden sowie <a href="https://waldvogel.family/tags/StagedRollout" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StagedRollout</span></a> (vom Kunden zu steuern; mit Feedback)</p><p>Aktuelle Kunden, die bei CrowdStrike bleiben wollen (und potenzielle Neukunden) sollten das aber überprüfen.<br><a href="https://dnip.ch/2024/07/23/zweites-crowdstrike-verhindern/#pir" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dnip.ch/2024/07/23/zweites-cro</span><span class="invisible">wdstrike-verhindern/#pir</span></a></p>
0xor0ne<p>Introduction to crafting custom fuzzers with LibAFL</p><p><a href="https://www.atredis.com/blog/2023/12/4/a-libafl-introductory-workshop" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">atredis.com/blog/2023/12/4/a-l</span><span class="invisible">ibafl-introductory-workshop</span></a></p><p>Credits Jordan Whitehead</p><p><a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a></p>
pearl<p>Hello everyone :)</p><p>Since it seems to be a requirement, here is my <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> for anyone willing to follow a full-time lurker o_o</p><p> - I do <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> research, and this will make up most of what I post here<br> - I live in Germany<br> <br>Please do not follow if you cannot be kind :) I will likely mistype things or be overly passionate sometimes ._.</p>
Yee Ching :verified:<p>Together with Matheus Garbelini, <span class="h-card" translate="no"><a href="https://mastodon.social/@sudiptac" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sudiptac</span></a></span> will present <a href="https://infosec.exchange/tags/5Ghoul" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>5Ghoul</span></a> (<a href="https://github.com/asset-group/5ghoul-5g-nr-attacks" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/asset-group/5ghoul-</span><span class="invisible">5g-nr-attacks</span></a>) at <a href="https://infosec.exchange/tags/DEFCON32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DEFCON32</span></a> demo labs. Over a two-hour session, join them to see the capability of 5G NR fuzzing tool and live over-the-air attacks on 5G smartphones. <br><a href="https://infosec.exchange/tags/5G" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>5G</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/wireless" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireless</span></a> <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://infosec.exchange/tags/SUTD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SUTD</span></a> <a href="https://infosec.exchange/tags/ASSETGroup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASSETGroup</span></a></p>
buheratorA Bug Hunter’s Reflections on Fuzzing by <span class="h-card"><a class="u-url mention" href="https://infosec.exchange/@a13xp0p0v" rel="nofollow noopener noreferrer" target="_blank">@<span>a13xp0p0v</span></a></span> <br><br><a href="https://a13xp0p0v.github.io/img/Alexander_Popov-Reflections_on_Fuzzing.pdf" rel="nofollow noopener noreferrer" target="_blank">https://a13xp0p0v.github.io/img/Alexander_Popov-Reflections_on_Fuzzing.pdf</a><br><br><a class="hashtag" href="https://infosec.place/tag/fuzzing" rel="nofollow noopener noreferrer" target="_blank">#Fuzzing</a>
Gamozo's Streaming Palace<p>Gamozo is streaming!</p><p>Tibia formula reverse engineering with high-perf wayland screen capture</p><p><a class="hashtag" href="https://directory.owncast.online/tags/fuzzing" rel="nofollow noopener noreferrer" target="_blank">#fuzzing</a> <a class="hashtag" href="https://directory.owncast.online/tags/hacking" rel="nofollow noopener noreferrer" target="_blank">#hacking</a> <a class="hashtag" href="https://directory.owncast.online/tags/osdev" rel="nofollow noopener noreferrer" target="_blank">#osdev</a> <a class="hashtag" href="https://directory.owncast.online/tags/programming" rel="nofollow noopener noreferrer" target="_blank">#programming</a> <a class="hashtag" href="https://directory.owncast.online/tags/rust" rel="nofollow noopener noreferrer" target="_blank">#rust</a> <a class="hashtag" href="https://directory.owncast.online/tags/rant" rel="nofollow noopener noreferrer" target="_blank">#rant</a></p><p><a href="https://stream.bfa.lk" rel="nofollow noopener noreferrer" target="_blank">https://stream.bfa.lk</a></p>
Gamozo's Streaming Palace<p>Gamozo is streaming!</p><p>Tibia formula reversing through screen scraping</p><p><a class="hashtag" href="https://directory.owncast.online/tags/fuzzing" rel="nofollow noopener noreferrer" target="_blank">#fuzzing</a> <a class="hashtag" href="https://directory.owncast.online/tags/hacking" rel="nofollow noopener noreferrer" target="_blank">#hacking</a> <a class="hashtag" href="https://directory.owncast.online/tags/osdev" rel="nofollow noopener noreferrer" target="_blank">#osdev</a> <a class="hashtag" href="https://directory.owncast.online/tags/programming" rel="nofollow noopener noreferrer" target="_blank">#programming</a> <a class="hashtag" href="https://directory.owncast.online/tags/rust" rel="nofollow noopener noreferrer" target="_blank">#rust</a> <a class="hashtag" href="https://directory.owncast.online/tags/rant" rel="nofollow noopener noreferrer" target="_blank">#rant</a></p><p><a href="https://stream.bfa.lk" rel="nofollow noopener noreferrer" target="_blank">https://stream.bfa.lk</a></p>
matthiaskrgr<p><a href="https://chaos.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> is great because it combines the thrill of mining cryptocurrency with the chance of actually finding something useful.</p>
Hans-Christoph Steiner<p>"This bug also shows that we have an over-reliance on <a href="https://social.librem.one/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> for security assurance of complex parser code. Fuzzing is great, but we know that there are many serious security issues that aren't easy to fuzz. For sensitive attack surfaces like image decoding (zero-click remote <a href="https://social.librem.one/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> attack surface), there needs to 1) be a bigger investment in proactive source code reviews, and 2) a renewed focus on ensuring these parsers are adequately sandboxed." <a href="https://blog.isosceles.com/the-webp-0day/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.isosceles.com/the-webp-0d</span><span class="invisible">ay/</span></a> <a href="https://social.librem.one/tags/libwebp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libwebp</span></a> <a href="https://social.librem.one/tags/WebP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebP</span></a></p>
Federico Mena Quintero<p>Are you a <a href="https://mstdn.mx/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a> <a href="https://mstdn.mx/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> nerd? Would you be able to help with fuzzing librsvg?</p><p><a href="https://gitlab.gnome.org/GNOME/librsvg/-/issues/1018" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.gnome.org/GNOME/librsvg</span><span class="invisible">/-/issues/1018</span></a> has a bunch of tasks that I'd love for someone to explore.</p>
hardik05<p>I will be giving two days training on fuzzing on 14-15th august at <span class="h-card"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>defcon</span></a></span>, register now:<br><a href="https://training.defcon.org/products/hardik-shah-mastering-fuzzing-a-comprehensive-training-on-identifying-vulnerabilities-in-software" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/products/h</span><span class="invisible">ardik-shah-mastering-fuzzing-a-comprehensive-training-on-identifying-vulnerabilities-in-software</span></a> <br><a href="https://infosec.exchange/tags/defcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>defcon</span></a> <a href="https://infosec.exchange/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://infosec.exchange/tags/training" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>training</span></a></p>