From e142033cd0c3ae4c819dfbd3470195c3ad78e17c Mon Sep 17 00:00:00 2001 From: DavidKorczynski Date: Mon, 26 Oct 2020 22:17:01 +0000 Subject: [PATCH] Additional fuzzing and symbolic execution content. Additional fuzzing and symbolic execution content - a course as well as a blog post that wraps four instructional videos. --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index c92882b..f4b2884 100644 --- a/README.md +++ b/README.md @@ -74,6 +74,7 @@ A curated list of fuzzing resources ( Books, courses - free and paid, videos, to [Exodus Intelligence - Vulnerability development master class](https://blog.exodusintel.com/2016/05/18/exodus-intelligence-2016-training-course/) +[Ada Logics - Applied Source Code Fuzzing](https://adalogics.com/training-source-fuzz) ## Videos @@ -358,6 +359,7 @@ https://www.corelan.be/index.php/2013/02/26/root-cause-analysis-memory-corruptio [SMT-LIB](http://smtlib.cs.uiowa.edu/) - An international initiative aimed at facilitating research and development in Satisfiability Modulo Theories (SMT) +[Symbolic execution with KLEE: From installation and introduction to bug-finding in open source software](https://adalogics.com/blog/symbolic-execution-with-klee) - A set of four instructional videos introducing KLEE, starting with how to get started with KLEE and ending with a demo that finds memory corruption bugs in real code. ### References