FuzzingLabs’ cover photo
FuzzingLabs

FuzzingLabs

Computer and Network Security

Fuzzinglabs is a cybersecurity startup specializing in vulnerability research, fuzzing, offensive & blockchain security.

About us

Fuzzinglabs is a cybersecurity startup specializing in vulnerability research, fuzzing, offensive and blockchain security. We offer a wide-range of highly technical consulting services and online courses/trainings around offensive security and fuzzing. We are also building custom security tools and products on-demand.

Website
https://fuzzinglabs.com/
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Paris
Type
Self-Owned
Founded
2019
Specialties
WebAssembly, Rust, Security, Fuzzing, Vulnerability research, Consulting, Training, Go, Blockchain, and Online courses

Locations

Employees at FuzzingLabs

Updates

  • FuzzingLabs reposted this

    We just published a full N-day reproduction and analysis of #CVE-2026-23111, a #Linux kernel vulnerability affecting nf_tables. This bug comes from an inverted condition in the reactivation path of catch-all map elements, leading to a use-after-free that we leveraged to achieve local privilege escalation. In this write-up, we go beyond the CVE description: - An analysis of the patch to find the vulnerable code path - A dive into nftables internals to fully understand the bug - Our full exploit path which leads to local privilege escalation on a production kernel Reproducing real-world vulnerabilities is still one of the most effective ways to truly understand them and to build better detection, fuzzing strategies, and exploit mitigations. If you're working on: - kernel security - fuzzing / vuln research - or exploit development this one is worth a read. Blogpost made by to Lyes BOURENNANI and Alexis Pinson link in comment

    • No alternative text description for this image
  • FuzzingLabs reposted this

    FuzzingLabs is at Forum InCyber - all 3 days. Find us at stand E1-11-F (Cybersecurity for Industry hall). We’ll be demoing FuzzForge, our AI-native offensive security platform that goes beyond vulnerability detection, it validates actual exploitability at scale. FuzzForge runs specialized AI agents for fuzzing, reverse engineering, triage, and exploit analysis, so your security team stops chasing false positives and starts proving what’s truly exploitable. Built by Pwn2Own winners. Battle-tested on real targets. Come talk to us or DM to schedule a demo on-site. 👇 #ForumInCyber #FIC2025 #OffensiveSecurity #FuzzForge #FuzzingLabs

    • No alternative text description for this image
  • 🔐 FuzzingLabs will be at Forum INCYBER (FIC) 2026! We're proud to be a Bronze Partner of one of the Europe's leading cybersecurity event! This year, you'll find us at the CFI (Cybersecurity for Industry) village, stand E1-11-F. Come meet the team and discover #FuzzForge, our Continuous Offensive Security Platform built for security teams who want to move from reactive patching to continuous, automated offensive validation. 📍 Stand E1-11-F — CFI Pod 🗓️ Forum InCyber 2026 — Lille Grand Palais, France 🔗 https://lnkd.in/e97BefFP If you're attending and want to connect, drop us a message! we'd love to chat firmware security, fuzzing, and offensive automation. #ForumInCyber #FIC2026 #CFI #CybersecurityForIndustry #FuzzingLabs #FuzzForge #OffensiveSecurity #IoTSecurity #Fuzzing

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • 🚀 New Training Released - Masterclass: Scapy for Offensive Security We’re excited to announce our new intensive online workshop: 👉 Masterclass Scapy: From Packet Crafting to CVE Reproduction Scapy is one of the most powerful tools for offensive security engineers. In this hands-on masterclass, we go far beyond basics. 🔬 What you’ll learn: • Deep packet manipulation (crafting, editing, decoding) • Real network interactions (send/receive, protocol analysis) • Building and fuzzing a DNS server with Scapy • Introduction to differential fuzzing • Reproducing real-world CVEs using Scapy • Understanding buffer overflows and parsing vulnerabilities This workshop is designed for security engineers, researchers, red teamers, and anyone who wants to level up their network protocol exploitation skills. 💻 Fully online 🧠 Intensive & hands-on 🎯 Focused on offensive use cases If you’re serious about protocol fuzzing and vulnerability research, this masterclass is for you. 🔗 Learn more & enroll: https://lnkd.in/eZfe2mrN #FuzzingLabs #Scapy #OffensiveSecurity #Fuzzing #NetworkSecurity #CVE #RedTeam #CyberSecurity

    • No alternative text description for this image
    • No alternative text description for this image
  • 🇨🇦 FuzzingLabs at REcon Montréal 2026 - 3 Advanced Trainings in June We’re excited to announce that FuzzingLabs will deliver three in-depth trainings at REcon Montréal 2026, taking place June 15-18 in Montréal, Canada. This year, our instructors will cover modern offensive security challenges, from secure systems programming to reverse engineering and real-world IoT exploitation. 🧠 Our trainings at REcon 2026: 🔹 Rust Development for Cyber Security Learn how to build real defensive security tools in Rust through hands-on incident response, malware analysis, memory forensics, and detection engineering. 🔹 Reversing Modern Binaries: Practical Rust & Go Analysis A deep dive into reversing modern Rust and Go binaries, combining tooling, techniques, and advanced malware analysis across both ecosystems. 🔹 Attacking Real-World IoT and Embedded Devices Hands-on exploitation of real consumer and enterprise IoT devices using firmware analysis, emulation, fuzzing, and binary exploitation with targets inspired by real Pwn2Own-style scenarios. These are 4-day, highly practical trainings, designed for security engineers, reverse engineers, and researchers who want skills they can apply immediately. 📍 REcon Montréal 2026 📅 June 15-18, 2026 🔗 Full details & registration: https://lnkd.in/ecQ3uer8 See you in Montréal 👋 #REcon2026 #FuzzingLabs #OffensiveSecurity #ReverseEngineering #RustLang #GoLang #IoTSecurity #EmbeddedSecurity #CyberSecurityTraining

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • 🚀 New Course Released: Fuzzing #Windows Userland Applications (3-Day Certified Training) This is our most advanced Windows-focused training yet built for security engineers, VR researchers, and pentesters who want to master real-world fuzzing on targets like WinRAR, IrfanView, PDF-XChange, and Assault Cube, using tools such as winAFL, Jackalope, Lighthouse, and WTF snapshot fuzzing. You’ll learn how to: - Build and optimize fuzzing harnesses - Rediscover real vulnerabilities & triage crashes - Perform deep coverage analysis - Apply grammar-based & snapshot fuzzing techniques - Analyze complex Windows binaries without symbols This training was delivered at #Zer0Con, and is now available to everyone. For the release, we’re offering a 15% discount for the first 10 students. 🎟️ Code: WINFUZZ15 👉 Link: https://lnkd.in/e93EHhgS

  • Last week, Patrick Ventuzelo our CEO and the team were at European Cyber Week - Official page in Rennes, and it was an amazing experience. Three intense days meeting great people, sharing ideas, and presenting FuzzForge to dozens of teams who were genuinely excited about the project. Huge thanks to everyone who came by our booth! your feedback and energy were incredible. 👉 Explore FuzzForge: https://lnkd.in/eFND5NgA

    • No alternative text description for this image
  • Happy and proud to launch two new training/bootcamps in partnership with ESIEA - École d'Ingénieur·e·s d'un numérique utile !!! We will teach applications and mobile security Heureux/impatient de lancer deux nouvelles formations sur le coeur de cible de FuzzingLabs: la sécurité de nos applications et de nos mobiles"

    Formations BADGE ESIEA : formez-vous à l’excellence technique en Cybersécurité 💻 Les candidatures pour nos 4 formations BADGE sont ouvertes pour la prochaine session annuelle qui se déroulera du 26 janvier au 26 juin 2026 (voir agenda en ligne). 4 formations avec la même ambition : 230 heures intensives pour atteindre l’excellence technique, la maitrise des concepts sous-jacents, des enseignements poussés à l’état de l’art, des intervenants professionnels des domaines enseignés, des études de cas pratiques réels… 🤝 Bien sûr, rien ne serait possible sans nos partenaires industriels qui portent avec nous ces programmes : ▪️ Quarkslab pour les 2 formations BADGE Sécurité Offensive/Red Team et BADGE Reverse Engineering. ▪️ FuzzingLabs pour les 2 formations BADGE Sécurité des Applications et BADGE Sécurité Mobile. Dispensées principalement en cours du soir et en week-end dans les locaux parisiens (5e Arr.) de l'ESIEA, ces formations sont compatibles avec la poursuite d'une activité professionnelle en parallèle. Elles visent des professionnels avec un solide niveau en informatique et en cybersécurité qui souhaitent devenir des experts de référence dans leur domaine. 📣 Les candidatures sont désormais ouvertes. Attention : les places sont limitées et attribuées au fil de l’eau. Pour toute information supplémentaire, vous pouvez écrire à l'adresse email de contact figurant sur la page web de la formation qui vous intéresse : https://lnkd.in/dDb55Bib Retrouvez aussi nos partenaires Quarkslab et FuzzingLabs sur leur stand au prochain salon ECW qui se tiendra à Rennes du 17 au 20 novembre prochains.

    • No alternative text description for this image
  • 🚀 Big news from FuzzingLabs Academy We’re expanding our training lineup with a brand new format: Masterclasses 🎓 Short, ultra-focused sessions on cutting-edge security topics, perfect to boost your skills fast! 📅 Our Q4 2025 Course Lineup is live: - Fuzzing Windows Userland Applications (Training) - Scapy for Vulnerability Research (Masterclass) - Intro to Cryptographic Hashing (Masterclass) - Reversing Modern Binaries: Rust (Training) - Reversing Modern Binaries: Go (Training) - Applied AI/LLM for Android APK Reversing (Training) - Ollama Vulnerability Research (Masterclass) 🔥 Pre-sales are now open with 20% discount with the code: PRESALE2025 👉 Reserve your spot: https://lnkd.in/euB_uujn #FuzzingLabs #Cybersecurity #Fuzzing #ReverseEngineering #AI #LLM #AppSec

    • No alternative text description for this image
  • View organization page for FuzzingLabs

    2,768 followers

    Almost 150 star, 15 forks on Github ans 70+ people on our dedicated discord! Github project: https://lnkd.in/eDxAUdT3 Thanks for all the support!

    🚀 We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. 🔷 Open-source release is the first step toward our vision of "Offensive-Security-as-Code." 🔷 Workflows you can run, share, and extend. 🔷 Built by the team at @FuzzingLabs. Github : https://lnkd.in/eDRPKrjn Join the Alpha Waitlist : https://fuzzforge.ai/ We've also launched the FuzzingLabs Community Discord where researchers, engineers, and security enthusiasts can connect and collaborate: 👉 https://lnkd.in/eVNDW2xe Come join us and Let's forge the future of AppSec & Offensive Security together! #FuzzForge #Fuzzing #AppSec #OpenSource #CyberSecurity

Similar pages

Browse jobs