Skip to main content

Research Blog

Cover for Breaking ILIAS #1: From Open Redirect to Admin

Breaking ILIAS #1: From Open Redirect to Admin

Offensive Security Sep 24, 2025

We describe two vulnerabilities in the learning management platform ILIAS that we found as part of a recent client engagement. Exploiting a stored XSS we achieve command execution as root.

Cover for Fuzzing Made Easy #2: Unlocking the Secrets of Effective Fuzzing Harnesses

Fuzzing Made Easy #2: Unlocking the Secrets of Effective Fuzzing Harnesses

Tooling & Open Source Aug 7, 2025

Fuzzing is an effective technique for finding bugs, but it’s only as effective as your fuzzing harness. We explore the secrets of good harnessing for fuzzing, from common mistakes to best practices.

Cover for Hexagon-Fuzz: Full-system emulated fuzzing of Qualcomm basebands

Hexagon-Fuzz: Full-system emulated fuzzing of Qualcomm basebands

Mobile & IoT Security Jun 27, 2025

We developed the first open-source toolchain for full-system emulated fuzzing of any Hexagon firmware, addressing a critical gap in baseband security research.

Cover for Ethical hackers can help reduce SS7 abuse

Ethical hackers can help reduce SS7 abuse

Offensive Security Jun 17, 2025

Ethical hackers help reduce SS7 abuse by finding security problems to protect phone users, and clear rules are needed to ensure only trusted testers have SS7 access.

Cover for Enhancing our Code Audits with AI

Enhancing our Code Audits with AI

Defensive Security Jun 6, 2025

We combine human expertise with AI as a co-pilot to enhance code audits, carefully protecting client confidentiality by analyzing closed-source code in-house, and continuously improving our models through benchmarking and fine-tuning without replacing expert human review.

Cover for Xiaohongshu: Little Red Book reads you

Xiaohongshu: Little Red Book reads you

Mobile & IoT Security May 12, 2025

Xiaohongshu exposes users to network-level attacks through partially unencrypted traffic, collects more device data than disclosed, and actively obstructs app analysis efforts.

Cover for Fuzzing Made Easy Part #3: GoLibAFL — Fuzzing Go binaries using LibAFL

Fuzzing Made Easy Part #3: GoLibAFL — Fuzzing Go binaries using LibAFL

Tooling & Open Source Apr 16, 2025

We developed GoLibAFL, a new fuzzer for Go code built on top of LibAFL.

Cover for Fuzzing Made Easy Outline

Fuzzing Made Easy Outline

Tooling & Open Source Jan 31, 2025

In this article series, we share all we know about effective fuzz testing.

Cover for Fuzzing Made Easy #1: A beginner’s guide to writing a fuzzing harness

Fuzzing Made Easy #1: A beginner’s guide to writing a fuzzing harness

Tooling & Open Source Jan 31, 2025

In this article, we focus on customizing a fuzzing harness, the key to effective fuzz testing.

Cover for BogusBazaar: A criminal network of webshop fraudsters

BogusBazaar: A criminal network of webshop fraudsters

Offensive Security Aug 5, 2024

A large criminal network operates tens of thousands of fake webshops that have processed over a million orders totaling USD 50 million, stealing credit card details from more than 850,000 victims mainly in Western Europe and the USA.

Security Research Labs is a member of the Allurity family. Learn More (opens in a new tab)