Fuzzing Science
👾 Hello fellow hacker! Welcome to Fuzzing Science! If you're into fuzzing, working on emulators, program analysis, or just love to tinker with random stuff, maybe you'll find something interesting here.
About Me
I am Chaitanya (ant4g0nist), the founder of Yōkai Network. My main areas of focus include development and security, specializing in Application Security, Secure Communications, Vulnerability Research, Fuzzing, and Exploit Development. Previously, I have worked mainly on fuzzing Apple iOS and Mac OS X Core frameworks, browsers and basebands. Developed various fuzzers and fuzzing frameworks for distributed fuzzing of Apple applications and grammar based interpreter fuzzing framework for languages like python, GLSL.
Some of the CVE's include, but not limited to:
Projects
Lisa.py
An Exploit Dev Swiss Army Knife
ManuFuzzer
Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM
Sloth
Coverage guided fuzzing framework for Android Native libraries using libFuzzer and QEMU
Rudroid
Writing the World's worst Android Emulator in Rust
Decompiler
RetDec Decompiler Plugin for LLDB
Polar
LLDB plugin which queries OpenAI's davinci-003 to explain disassembly
Chinstrap
Development environment and testing framework for Tezos
Crashmon
A LLDB Based replacement for CrashWrangler
Susanoo
A REST API security testing framework
PDF Fuzzer
Fuzzing PDFs like its 1990s
WebGL Fuzzer
WebGL fuzzer based on IDLs
Vulnerable Kext
A 'Vulnerable by Design' kext for iOS/macOS kernel exploitation