Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Jazzer, created by Code Intelligence, is a coverage-guided fuzzer designed for the JVM platform that operates within the process. It draws inspiration from libFuzzer, incorporating several of its advanced mutation features powered by instrumentation into the JVM environment. Users can explore Jazzer's autofuzz mode via Docker, which autonomously produces arguments for specified Java functions while also identifying and reporting any unexpected exceptions and security vulnerabilities that arise. Additionally, individuals can utilize the standalone Jazzer binary available in GitHub release archives, which initiates its own JVM specifically tailored for fuzzing tasks. This flexibility allows developers to effectively test their applications for robustness against various edge cases.

Description

Fuzz testing, commonly referred to as fuzzing, is a technique used in software testing that aims to discover implementation errors by injecting malformed or semi-malformed data in an automated way. For example, consider a scenario involving an integer variable within a program that captures a user's selection among three questions; the user's choice can be represented by the integers 0, 1, or 2, resulting in three distinct cases. Since integers are typically stored as fixed-size variables, a failure to implement the default switch case securely could lead to program crashes and various traditional security vulnerabilities. Fuzzing serves as an automated method for uncovering software implementation issues, enabling the identification of bugs when they occur. A fuzzer is a specialized tool designed to automatically inject semi-random data into the program stack, aiding in the detection of anomalies. The process of generating this data involves the use of generators, while the identification of vulnerabilities often depends on debugging tools that can analyze the program's behavior under the influence of the injected data. These generators typically utilize a mixture of established static fuzzing vectors to enhance the testing process, ultimately contributing to more robust software development practices.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

CI Fuzz
Docker
Java
Kotlin
LibFuzzer

Integrations

CI Fuzz
Docker
Java
Kotlin
LibFuzzer

Pricing Details

Free
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Code Intelligence

Country

Germany

Website

github.com/CodeIntelligenceTesting/jazzer

Vendor Details

Company Name

OWASP

Country

United States

Website

owasp.org/www-community/Fuzzing

Product Features

Product Features

Alternatives

go-fuzz Reviews

go-fuzz

dvyukov

Alternatives

ClusterFuzz Reviews

ClusterFuzz

Google
LibFuzzer Reviews

LibFuzzer

LLVM Project
Radamsa Reviews

Radamsa

Aki Helin
ToothPicker Reviews

ToothPicker

Secure Mobile Networking Lab
go-fuzz Reviews

go-fuzz

dvyukov
Atheris Reviews

Atheris

Google