<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Thomas Rooijakkers</title>
    <description>The latest articles on DEV Community by Thomas Rooijakkers (@thomastno).</description>
    <link>https://dev.to/thomastno</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2114882%2F6d4038b4-b701-41d8-ade1-4eed49dd0c87.jpeg</url>
      <title>DEV Community: Thomas Rooijakkers</title>
      <link>https://dev.to/thomastno</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/thomastno"/>
    <language>en</language>
    <item>
      <title>Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️</title>
      <dc:creator>Thomas Rooijakkers</dc:creator>
      <pubDate>Mon, 23 Sep 2024 16:18:39 +0000</pubDate>
      <link>https://dev.to/thomastno/recently-released-coverage-guided-rest-api-fuzzer-wuppiefuzz-43ci</link>
      <guid>https://dev.to/thomastno/recently-released-coverage-guided-rest-api-fuzzer-wuppiefuzz-43ci</guid>
      <description>&lt;p&gt;I’m thrilled to share something we’ve been working on: WuppieFuzz, a new open-source coverage-guided REST API fuzzer. It's designed with &lt;strong&gt;ease of use&lt;/strong&gt;, &lt;strong&gt;modularity&lt;/strong&gt;, and &lt;strong&gt;clarity&lt;/strong&gt; in mind, making it accessible for everyone from security researchers to developers who want to validate their REST APIs.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Sets WuppieFuzz Apart?
&lt;/h2&gt;

&lt;p&gt;We didn’t just want to create another fuzzer; we wanted to make one that was practical for real-world applications. WuppieFuzz supports black box, grey box, and white box testing, allowing you to run security tests in a way that best fits your needs.&lt;/p&gt;

&lt;p&gt;But here’s the real magic: it’s designed to provide clear, actionable explanations for any discovered vulnerabilities, making it easier for developers to understand and fix issues without needing deep security expertise.&lt;/p&gt;

&lt;h3&gt;
  
  
  Key Features
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ease of use: Designed to be user-friendly, even if you’re new to fuzzing&lt;/li&gt;
&lt;li&gt;Modularity: You can easily extend it and introduce new features&lt;/li&gt;
&lt;li&gt;Useful reports: Through the provided dashboard, it's made easy to examine your fuzzing campaign results&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Why Open Source?
&lt;/h3&gt;

&lt;p&gt;We believe in the power of community, and that’s why WuppieFuzz is 100% open source and free to use. We’re excited to see how the developer and security community will use and improve it. Contributions are highly encouraged. Whether it’s reporting issues, adding new features, or improving documentation!&lt;/p&gt;

&lt;p&gt;👉 Get started with WuppieFuzz on GitHub: &lt;a href="https://github.com/TNO-S3/WuppieFuzz" rel="noopener noreferrer"&gt;WuppieFuzz&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Featured at ONE Conference
&lt;/h3&gt;

&lt;p&gt;We’re proud to say WuppieFuzz was also featured in the &lt;a href="https://emagazine.one-conference.nl/2024/" rel="noopener noreferrer"&gt;2024 ONE Conference e-magazine&lt;/a&gt;. If you're interested, you can check out the feature &lt;a href="https://emagazine.one-conference.nl/2024/finally-validate-your-publicly-exposed-interfaces-with-ease/" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>security</category>
      <category>testing</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
