Maksim Shudrak Profile
Maksim Shudrak

@MShudrak

Followers
851
Following
262
Media
8
Statuses
82

Offsec, Exploit/Malware Dev, Vuln Research, Tools Dev, RE Opinions expressed are solely my own and do not express the views or opinions of my employer.

San Francisco, CA
Joined June 2017
Don't wanna be here? Send us removal request.
@trailofbits
Trail of Bits
6 months
Buttercup won the $3M second prize at DARPA's AIxCC. We found 28 vulnerabilities across 20 CWEs with 90% accuracy at just $181/point, achieving this with exclusively non-reasoning LLMs.
2
15
136
@MShudrak
Maksim Shudrak
3 years
Need to evaluate impact of leaked GCP credentials or VM compromise? We implemented a GCP Scanner to help with that! I am very excited to present GCP Scanner ( https://t.co/2rV6OXR3hf) w/ @_under_hill at BlackHat Arsenal USA this year on August 10. https://t.co/ESMycdLPjD
Tweet card summary image
github.com
A comprehensive scanner for Google Cloud. Contribute to google/gcp_scanner development by creating an account on GitHub.
1
20
53
@argvee
Heather Adkins - Ꜻ - Spes consilium non est
3 years
Today we take you behind the scenes like never before, learn about the work @Google's security experts do behind closed doors to keep billions safe every day. The HACKING GOOGLE docuseries is streaming NOW on @YouTube →  https://t.co/QP1TpgPXgV
Tweet card summary image
youtube.com
Five elite security teams. Six never-before-told stories. Go behind the scenes with the hacking teams at Google keeping more people safe online than anyone e...
8
102
293
@MShudrak
Maksim Shudrak
3 years
The documentary has 6 episodes featuring various security teams at Google. There are a lot of interesting previously undisclosed details. Overall quality of the series is just amazing :)
0
1
10
@MShudrak
Maksim Shudrak
3 years
It is finally live :) definitely recommending to watch https://t.co/8jk5BFWww1.
blog.google
4
44
163
@_under_hill
Jacob Butler
4 years
Excited to have found my first CVE (CVE-2022-23302) researching Log4j 1.x with @MShudrak
0
3
8
@kayseesee
Kostya Serebryany
4 years
I'm still hiring! Looking for an engineering manager in Sunnyvale, CA, USA. Details: https://t.co/fi0NaENY8I (And happy new year everyone!)
0
14
35
@mechanicalnull
mechanicalnull
4 years
Screenshot might help:
2
4
9
@mechanicalnull
mechanicalnull
4 years
I wrote a basic #fuzzing UI for @MShudrak ‘s fuzzer Manul (based on AFL) to help people see/understand grey-box fuzzing!
Tweet card summary image
github.com
Python GUI for seeing what's happening inside a fuzzer - mechanicalnull/fuzzwatch
2
9
32
@MShudrak
Maksim Shudrak
6 years
Let's talk about brute-forcing ASLR on modern Windows. Check my blog post on Medium
Tweet card summary image
medium.com
Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of my current employer or any former employers.
1
70
179
@MShudrak
Maksim Shudrak
6 years
Especially in Figure 2, 64-bit DLL only has 524 288 possible base-addresses!!!
0
2
4
@MShudrak
Maksim Shudrak
6 years
I just found an awesome blog post about ASLR weaknesses on modern Windows. Some stuff is 100% new for me.
1
80
212
@MShudrak
Maksim Shudrak
6 years
My article "Leveraging Coverage-Guided Fuzzing to Find Exploitable Bugs" was published by Pentest Mag
0
9
53
@taviso
Tavis Ormandy
6 years
I have something fun for you, I pulled the javascript interpreter out of Avast and ported it to Linux 😆 This runs unsandboxed as SYSTEM, any vulns are wormable pre-auth RCE on 400M endpoints  ¯\_(ツ)_/¯ https://t.co/vGrfke7fPd 🐧
71
943
3K
@infernosec
Abhishek Arya
6 years
After a decade of fuzzing, we just launched FuzzBench, a fuzzer benchmarking platform to bridge the gap between academic fuzzing research and industry fuzzing engines (e.g libFuzzer, AFL, Honggfuzz).  https://t.co/bo6rgxXi23
Tweet card summary image
github.com
FuzzBench - Fuzzer benchmarking as a service. Contribute to google/fuzzbench development by creating an account on GitHub.
6
219
547
@MShudrak
Maksim Shudrak
6 years
This is so cool!
@is_eqv
is-eqv.bsky.social
6 years
Sneak Peak at our (@ms_s3c, @bl4ckic3, @thorstenholz ) new S&P paper. Playing Super Mario with (a modified) AFL:
0
0
2
@richinseattle
Richard Johnson
6 years
Just a reminder that I’ll be giving a keynote at FuzzCon RSA on Tuesday morning in SF. I’ll talk about history, modern adoption, and future challenges. There are about 120 attendees registered so it should be a great size for networking. Ping me for a free registration code.
@FuzzingIO
FUZZING IO
6 years
Richard Johnson(@richinseattle) of Fuzzing IO will be delivering the keynote at FuzzCon during RSA. Come join us Feb 25 at The Pearl in San Francisco. Complimentary tickets available by request. https://t.co/tg6C4pBDIQ
1
11
43
@MShudrak
Maksim Shudrak
6 years
Just released Manul v 0.4, a lot of performance improvements and bug fixes. New features: - InApp coverage-guided blackbox fuzzing on both Windows (winAFL-like) and Linux. On Linux, it is the only tool that supports this type of fuzzing now :) - Added AFL forkserver (x10 speedup)
2
33
116
@MShudrak
Maksim Shudrak
6 years
Woot woot, my DEFCON talk is available on youtube now: check it out here:
1
10
18
@andreafioraldi
Andrea Fioraldi
6 years
I've just written a performant in-memory fuzzing module with @fridadotre for AFL++ https://t.co/TqXEHD3yNf. Watch AFL++ on GH and stay tuned for a frida_mode in the next days!
5
95
275