Vulnerability Research & Fuzzing | Signal Labs

  • Thread starter protectaccount
  • Start date
  • Tagged users None

protectaccount

Hero Member
Joined
December 27, 2025
Messages
747
Reaction score
1,111
Points
93


A complete introduction to 0-day discovery for Windows targets, focusing on closed-source real-world software, including kernel modules and user code.


Who should take this course?:

Anyone looking to get into Windows vulnerability research and fuzzing, although many of the concepts and approaches taught can be used for fuzzing on other platforms (MacOS/Linux, etc), all the exercises will focus on Windows. Also useful for red-teamers looking to add zero-days to their arsenal (with a dedicated section on finding quick 0-days on time-limited engagements).


Most topics are beginner friendly and assume limited or no prior experience with modern fuzzing approaches and Windows vulnerability research, with advanced topics (hypervisors & emulators, for example) presented in an easy-to-understand manner.





To see this hidden content, you need to Upgrade Your Membership OR reply and react with one of the following reactions: Like
 
  • Tags
    research vulnerability vulnerability research