FuzzingLabs Profile Banner
FuzzingLabs Profile
FuzzingLabs

@FuzzingLabs

Followers
8K
Following
728
Media
250
Statuses
747

Research-oriented Cybersecurity startup specializing in #fuzzing, Vulnerability Research & Offensive security on Mobile, Browser, AI/LLM, Network & Blockchain.

Paris
Joined August 2020
Don't wanna be here? Send us removal request.
@FuzzingLabs
FuzzingLabs
6 months
We already reported 7 vulnerabilities to @ollama via @huntr_ai 🔥. The first one is CVE-2024-12886, report is now public even if the bug is not fixed yet. Please do not exposed your Ollama server, it is not the only bug we found. 🛡️.
Tweet media one
Tweet media two
6
33
146
@grok
Grok
3 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
1K
3K
11K
@FuzzingLabs
FuzzingLabs
6 days
📊 Dotting (CFG Editing). Use --reduced or --only-entrypoint to create minimal graphs, and re-inject just the functions you need for analysis. Sol-azy lets you trim huge CFGs into something actionable.
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
6 days
⏪ Reverse Engine. Disassemble eBPF, track .rodata immediates, generate control flow graphs (CFGs), and even match instruction-level patterns.
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
6 days
🎣 Fetcher Module. Need the on-chain deployed bytecode of a program?. Sol-azy can fetch the actual .so from mainnet or custom RPCs.
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
6 days
⚙️ Build Engine (still in WIP). No need to fumble with anchor or cargo separately. Sol-azy can detect project type (and version of anchor/cargo) and compile .so artifacts for you, whether you're using Anchor or raw SBF.
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
6 days
📜 SAST Engine. Sol-azy uses a custom Starlark rule engine to scan the Rust AST and catch common issues statically. Write rules once, reuse them across audits.
Tweet media one
1
0
1
@FuzzingLabs
FuzzingLabs
6 days
Ever wanted a single tool to build, analyze (static analyzer), fetch, and reverse engineer Solana SBPF programs? 💻. We built Sol-azy, a modular CLI toolkit for security researchers: Let’s break it down 🧵
Tweet media one
3
12
72
@FuzzingLabs
FuzzingLabs
14 days
Finally!!!!! Look like we have some new targets to fuzz this summer 🔥.
@thezdi
Trend Zero Day Initiative
14 days
Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner @Meta and a $1,000,000 WhatsApp bounty. Yes - one million dollars. Plus new USB attack vectors on phones and more. Check out the details at
0
2
23
@FuzzingLabs
FuzzingLabs
23 days
Key takeaways:. - Training quality > parameter count.- Better orchestration + multi-agent strategies are the next frontier.- AI is a force-multiplier, not a silver bullet (yet)
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
23 days
⚠️ Reality check: every model produced 13-27 false positives. Human-in-the-loop review remains non-negotiable for the moment!
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
23 days
Community models hold their own! DeepHermes 3 lands 22.81 %, proof that open innovation matters.
Tweet media one
1
0
1
@FuzzingLabs
FuzzingLabs
23 days
Mid-tier open models punch above their weight:. - Mistral Medium 3 — 24 %.- LLaMA 4 Maverick — 23.53 %
Tweet media one
Tweet media two
1
0
0
@FuzzingLabs
FuzzingLabs
23 days
Top 3 performers. 🥇 GPT-4.1 — 37.21 % score.🥈 Claude Sonnet 4 — 34.04 %.🥉 ChatGPT-4o — 31.91 %
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
23 days
How we tested ?. - Single-pass code review (no multi-agent tricks).- Languages: Python, Go, C++.- 6 vulns hunted: SQLi, XSS, Cmd Injection, Weak Crypto, Buffer Overflow, File Inclusion
Tweet media one
1
0
0
@FuzzingLabs
FuzzingLabs
23 days
Our @FuzzingLabs AI Team put leading LLM agents through a real-world vulnerability benchmark. Spoiler → even the best model still misses more than half the bugs! 🧵
Tweet media one
4
2
15
@FuzzingLabs
FuzzingLabs
28 days
RT @fede_intern: Great work by @FuzzingLabs that hopefully will be very useful for the @solana community. @0xMert_ and @aeyakovenko hope y….
0
2
0
@FuzzingLabs
FuzzingLabs
28 days
🚀 We just released sol-azy on GitHub!. A modular CLI for static analysis & reverse engineering of #Solana sBPF programs — with disassembly, CFGs, and Starlark rule support. 🧵 👀 Docs: #Solana #RE #Security #Rust.
Tweet card summary image
github.com
Sol-azy is a modular CLI toolchain for static analysis and reverse engineering of Solana sBPF programs - FuzzingLabs/sol-azy
2
16
57
@FuzzingLabs
FuzzingLabs
1 month
Hardening checklist 🔐. - Upgrade to ≥ v0.3.15.- Bind to localhost or place behind VPN / reverse proxy.- Enforce auth (JWT, mTLS, API key).- Restrict egress & monitor logs for /api/create, /api/pull abuse.- Scan regularly (Shodan/Censys) for accidental exposure. 🔗 Full.
0
0
1
@FuzzingLabs
FuzzingLabs
1 month
The CVEs you can’t ignore 🐞. 💣 CVE-2024-7773(RCE) — patch in v0.1.47.⚠️ CVE-2025-0317 (DoS) - patch in v0.3.15. Keeping legacy tags online = giving intruders shell access.
Tweet media one
1
0
1