Binary machine learning. Credits:

Binary Learning

Learning to exploit binaries

In this article, we describe a system named VDiscover, created from the ground up to learn...

Depiction of a deep neural network. Credits:

Deep Hacking

Deep learning for vulnerability discovery

Here we describe the first systematic framework for using deep learning to detect...

Executive leaking business information

Attacking Without Announce

Nobody knows, but everything is allowed

We want to guide you about some management policies we suggest that you could take to answer...

Cats in a forest

Don't Let the Cat Out!

Trapdoor functions and their importance in security

This blog post is an overview of the mathematical concept 'Trapdoor,' the basis of information security.

Fluid Attacks, Among the Top Global Leaders 2018

Among the Top Global Leaders 2018

Fluid Attacks, a top cybersecurity company

Fluid Attacks was recognized as a global leader in the Cybersecurity category by Clutch, as one...

The actual serial killer doll

The Anomaly Serial Killer Doll

Hunting missing checks with anomaly detection

Here we describe the system Chucky, which applies machine learning and natural language...

Screen showing source code

Exploiting Code Graphs

Mining graph representations for vulnerabilities

In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...

Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms

In this article, we give a high-level view of each of the most important ML algorithms that have...

greek statue with small angels.

Asymmetric DoS, Slow HTTP Attack

The story of David and Goliath

Here you'll learn how a slow HTTP attack works, how to inspect HTTP requests and responses, and...

Can machines learn to hack?

Machine-Learning to Hack

Machine learning for vulnerability discovery

This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...

Hand holding a pirate toy

Bounty Writeup

How to resolve HTB Bounty

In this article, we present how to exploit a Bounty machine's vulnerabilities and how to gain...

Vulnerability disclosure

Vulnerability Disclosure Ecosystem

Responsible vulnerability disclosure

In this blog post, we will explain some good practices of vulnerability disclosure by...

Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.