Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Honggfuzz is a software fuzzer focused on enhancing security through its advanced fuzzing techniques. It employs evolutionary and feedback-driven methods that rely on both software and hardware-based code coverage. This tool is designed to operate in a multi-process and multi-threaded environment, allowing users to maximize their CPU's potential without needing to launch multiple fuzzer instances. The file corpus is seamlessly shared and refined across all processes undergoing fuzzing, which greatly enhances efficiency. When persistent fuzzing mode is activated, Honggfuzz exhibits remarkable speed, capable of executing a simple or empty LLVMFuzzerTestOneInput function at an impressive rate of up to one million iterations per second on modern CPUs. It has a proven history of identifying security vulnerabilities, including the notable discovery of the only critical vulnerability in OpenSSL to date. Unlike other fuzzing tools, Honggfuzz can detect and report on hijacked or ignored signals that result from crashes, making it a valuable asset for identifying hidden issues within fuzzed programs. Its robust features make it an essential tool for security researchers aiming to uncover hidden flaws in software systems.

Description

Syzkaller functions as an unsupervised, coverage-guided fuzzer aimed at exploring vulnerabilities within kernel environments, offering support for various operating systems such as FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, and Windows. Originally designed with a focus on fuzzing the Linux kernel, its capabilities have been expanded to encompass additional operating systems over time. When a kernel crash is identified within one of the virtual machines, syzkaller promptly initiates the reproduction of that crash. By default, it operates using four virtual machines for this reproduction process and subsequently works to minimize the program responsible for the crash. This reproduction phase can temporarily halt fuzzing activities, as all VMs may be occupied with reproducing the identified issues. The duration for reproducing a single crash can vary significantly, ranging from mere minutes to potentially an hour, depending on the complexity and reproducibility of the crash event. This ability to minimize and analyze crashes enhances the overall effectiveness of the fuzzing process, allowing for better identification of vulnerabilities in the kernel.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

FreeBSD
NetBSD
ClusterFuzz
Cygwin
Fuchsia Service Maintenance Software
Google ClusterFuzz
OpenBSD
OpenSSL

Integrations

FreeBSD
NetBSD
ClusterFuzz
Cygwin
Fuchsia Service Maintenance Software
Google ClusterFuzz
OpenBSD
OpenSSL

Pricing Details

Free
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Google

Country

United States

Website

github.com/google/honggfuzz

Vendor Details

Company Name

Google

Country

United States

Website

github.com/google/syzkaller

Product Features

Product Features

Alternatives

Alternatives

LibFuzzer Reviews

LibFuzzer

LLVM Project
ClusterFuzz Reviews

ClusterFuzz

Google
Atheris Reviews

Atheris

Google
ToothPicker Reviews

ToothPicker

Secure Mobile Networking Lab