Menu

In 5 steps, I will show you how to find a remote code execution vulnerability in an unreleased version of the  German Covid-19 tracing app (CWA), using feedback-based fuzz testing.

How Continental Tested 18 000 LoC in Only One Week The HMI Business Unit at Continental...

Just a few weeks ago, we published Jazzer, our coverage-guided fuzzing engine for the Java...

Fuzzing Everything! - That is the ultimate goal that is currently driving security teams at...

At Code Intelligence we already fixed thousands of bugs with our fuzzing engine for the JVM. Now...

Get an overview of our testing platform by watching our demo video. 

 

Watch CI Fuzz Demo

 

If you or your team are working on projects in Java or C/C++, then I have great news for you:...

Our latest releases (CI Fuzz 2.14 + 2.15) come with support for new CI/CD pipelines, “nonstop”...

This year our annual fuzzing event went into the second round, as we hosted FuzzCon Europe 2020....

Innovation and growth in software development have sparked a number of new approaches. Agile,...

The IT security company from Bonn will accelerate the development of its software testing...

Since the outbreak of the COVID-19 pandemic, tracing apps have been discussed in order to better...

Our latest release note comes with several new features for Java fuzzing and great improvements...

Executive Summary Software developers extend their existing frameworks and often write new...

Our vulnerability researcher Sirko Höer recently found vulnerabilities while fuzzing the...

From now on we will provide you with an overview of the latest changes and features for CI Fuzz...

Subscribe to our Newsletter!