nerdculture.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Be excellent to each other, live humanism, no nazis, no hate speech. Not only for nerds, but the domain is somewhat cool. ;) No bots in general. Languages: DE, EN, FR, NL, ES, IT

Administered by:

Server stats:

1.1K
active users

#rust

150 posts135 participants4 posts today

🌗 GitHub - R9295/autarkie:使用 Rust 巨集進行即時語法模糊測試
➤ Rust 開發者的全新模糊測試利器
github.com/R9295/autarkie
Autarkie 是一個使用 Rust 巨集構建的本地語法模糊測試工具。它能自動化創建語法模糊測試器,並支援 AFL++ (Forkserver) 和 cargo-fuzz (Inprocess) 兩種模式,甚至可以模糊測試 C/C++ 程式碼。Autarkie 的特色在於其語法維護的自動性、語法完整性、可重用的測試案例,以及與其他模糊測試器的整合能力。目前仍在 Beta 階段,並有靜態生命週期和需要 Nightly 版本 Rust 的限制。
+ 「這工具看起來很方便,能自動生成語法模糊測試器,省去了許多手動配置的麻煩。」
+ 「雖然目前還在 Beta 階段,但它的特性很有吸引力,特別是能模糊測試 C/C++ 程式碼的部分。」
#程式安全 #模糊測試 #Rust

Autarkie - Instant Grammar Fuzzing Using Rust Macros - R9295/autarkie
GitHubGitHub - R9295/autarkie: Autarkie - Instant Grammar Fuzzing Using Rust MacrosAutarkie - Instant Grammar Fuzzing Using Rust Macros - R9295/autarkie

Tomorrow we have a small #Rust gathering in Hamburg, Germany. From 1800 to 2100 roughly. It is more a show and tell format. Deliberately so that we are all more engaged and the hurdle to demonstrate something is kept small. If you are interested send me a PM.

I feel so stupid writing this in #Rust

```
if let SomeCons(_) = x { true } else { false }
```

anyone knows of some better solution?

I just need to do that in one place, so I don't think that hiding this dirty code under a method just for that one call is a good solution.

Continued thread

alright, almost got the backend for the #SparkleShare #Rust port working.

part for part, the Rust code is a lot more compact, robust, and easier to understand.

did drop some features that just too hacky to keep supporting (client-side encryption) but also added commit signing and per-server keys.

GTK UI next! but first I need to build a computer that can run Linux well natively. :)

Steganography Analysis With pngdump.py

This article discusses the analysis of a PNG file containing hidden malicious content using the pngdump.py tool. The image, 31744 pixels wide and 1 pixel high, was found to have a PE file embedded in its pixel data. The author demonstrates how to extract the hidden file using various Python tools and techniques, including slicing the raw pixel data to isolate the second channel where the malware was concealed. The extracted PE file, identified as a .NET executable, had 49 detections on VirusTotal, while the original PNG file had none, showcasing the effectiveness of this steganography technique in evading detection.

Pulse ID: 680caa2918e5441a8aab47f8
Pulse Link: otx.alienvault.com/pulse/680ca
Pulse Author: AlienVault
Created: 2025-04-26 09:40:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.