Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Fuzz testing, commonly referred to as fuzzing, is a technique used in software testing that aims to discover implementation errors by injecting malformed or semi-malformed data in an automated way. For example, consider a scenario involving an integer variable within a program that captures a user's selection among three questions; the user's choice can be represented by the integers 0, 1, or 2, resulting in three distinct cases. Since integers are typically stored as fixed-size variables, a failure to implement the default switch case securely could lead to program crashes and various traditional security vulnerabilities. Fuzzing serves as an automated method for uncovering software implementation issues, enabling the identification of bugs when they occur. A fuzzer is a specialized tool designed to automatically inject semi-random data into the program stack, aiding in the detection of anomalies. The process of generating this data involves the use of generators, while the identification of vulnerabilities often depends on debugging tools that can analyze the program's behavior under the influence of the injected data. These generators typically utilize a mixture of established static fuzzing vectors to enhance the testing process, ultimately contributing to more robust software development practices.

Description

Go-fuzz serves as a coverage-guided fuzzing tool designed specifically for testing Go packages, making it particularly effective for those that handle intricate inputs, whether they are textual or binary in nature. This method of testing is crucial for strengthening systems that need to process data from potentially harmful sources, such as network interactions. Recently, go-fuzz has introduced initial support for fuzzing Go Modules, inviting users to report any issues they encounter with detailed descriptions. It generates random input data, which is often invalid, and the function must return a value of 1 to indicate that the fuzzer should elevate the priority of that input in future fuzzing attempts, provided that it should not be stored in the corpus, even if it uncovers new coverage; a return value of 0 signifies the opposite, while other values are reserved for future enhancements. The fuzz function is required to reside in a package that go-fuzz can recognize, meaning the code under test cannot be located within the main package, although fuzzing of internal packages is permitted. This structured approach ensures that the testing process remains efficient and focused on identifying vulnerabilities in the code.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

CI Fuzz

Integrations

CI Fuzz

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OWASP

Country

United States

Website

owasp.org/www-community/Fuzzing

Vendor Details

Company Name

dvyukov

Website

github.com/dvyukov/go-fuzz

Product Features

Product Features

Alternatives

Radamsa Reviews

Radamsa

Aki Helin

Alternatives

Honggfuzz Reviews

Honggfuzz

Google
go-fuzz Reviews

go-fuzz

dvyukov
LibFuzzer Reviews

LibFuzzer

LLVM Project
ClusterFuzz Reviews

ClusterFuzz

Google
Atheris Reviews

Atheris

Google