About the For Pentesters / Bounty Hunters category

How to find vulnerabilities in third-party binaries


We have a blog post that may be of interest regarding finding vulnerabilities in third-party binaries. One of our software architects who is a vulnerabilitiy researcher found a vulnerability in a third-party library used by the National Geospatial Intelligence Agency (NGA), which has since been fixed. In this blog post, we describe how to find vulnerabilities using Mayhem.

Federal Solutions Architect