A two-part blog series posted on secret.club under the title: "Earn $200K by fuzzing for a weekend". Clickbait-y, yes, but I thought it was important to get people looking into differential fuzzing :)
Part 1 details the process of developing the increasingly specialised fuzzers which targeted the Solana Berkeley Packet Filter Virtual Machine.
Part 2 details the debugging process for each discovered bug along with the details originally provided to Solana.
Proceeds from these bug bounties were used to create an endowment for the Texas A&M Cybersecurity Club and a software testing course at Texas A&M University.