diff options
author | vanhauser-thc <vh@thc.org> | 2021-08-12 18:32:44 +0200 |
---|---|---|
committer | vanhauser-thc <vh@thc.org> | 2021-08-12 18:32:44 +0200 |
commit | 20815d68502f288d3939a39b91f6de1e58220e18 (patch) | |
tree | b226bbbd7b48af96bc13cce85f7281493d5cff51 | |
parent | c775f40ebf935ec85619fa3903af7a20a38baf98 (diff) | |
download | afl++-20815d68502f288d3939a39b91f6de1e58220e18.tar.gz |
remove duplicate link
-rw-r--r-- | README.md | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/README.md b/README.md index b3e464e1..19d3a866 100644 --- a/README.md +++ b/README.md @@ -261,7 +261,6 @@ Here are some good writeups to show how to effectively use AFL++: * [https://securitylab.github.com/research/fuzzing-sockets-FTP](https://securitylab.github.com/research/fuzzing-sockets-FTP) * [https://securitylab.github.com/research/fuzzing-sockets-FreeRDP](https://securitylab.github.com/research/fuzzing-sockets-FreeRDP) * [https://securitylab.github.com/research/fuzzing-apache-1](https://securitylab.github.com/research/fuzzing-apache-1) - * [https://github.com/antonio-morales/Fuzzing101](https://github.com/antonio-morales/Fuzzing101) If you do not want to follow a tutorial but rather try an exercise type of training then we can highly recommend the following: |