Why bother and spend money and resources on security? Why bother staging Security Development Lifecycle (SDL)? Why integrate fuzzing in the development process? Why to occupy the head with knowledge of various fuzzers like AFL, libfuzz, etc.? After all, it is possible to “simply” turn the search for vulnerabilities in their products into continuous torment and arrange a “sweet” life for researchers and intruders. Want to know how to do this? Then welcome under the cat! 3r3117.