Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I mean, you’re not going to fuzz your way to bit twiddling together a small virtual computer inside of a compression stream.


Of course – but you can definitely fuzz your way to the initial vulnerability. The VM stuff is done once you have that vulnerability and are writing the actual exploit, which is a manual process.


The blog says the PDF parsing was based on xpdf which is open source.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: