Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

AFL-Unicorn provides the capability to fuzz any binary that can be emulated using the Unicorn Engine, allowing you to target specific code segments for testing. If you can emulate the desired code with the Unicorn Engine, you can effectively use AFL-Unicorn for fuzzing purposes. The Unicorn Mode incorporates block-edge instrumentation similar to what AFL's QEMU mode employs, enabling AFL to gather block coverage information from the emulated code snippets to drive its input generation process. The key to this functionality lies in the careful setup of a Unicorn-based test harness, which is responsible for loading the target code, initializing the state, and incorporating data mutated by AFL from its disk storage. After establishing these parameters, the test harness emulates the binary code of the target, and upon encountering a crash or error, triggers a signal to indicate the issue. While this framework has primarily been tested on Ubuntu 16.04 LTS, it is designed to be compatible with any operating system that can run both AFL and Unicorn without issues. With this setup, developers can enhance their fuzzing efforts and improve their binary analysis workflows significantly.

Description

Go-fuzz serves as a coverage-guided fuzzing tool designed specifically for testing Go packages, making it particularly effective for those that handle intricate inputs, whether they are textual or binary in nature. This method of testing is crucial for strengthening systems that need to process data from potentially harmful sources, such as network interactions. Recently, go-fuzz has introduced initial support for fuzzing Go Modules, inviting users to report any issues they encounter with detailed descriptions. It generates random input data, which is often invalid, and the function must return a value of 1 to indicate that the fuzzer should elevate the priority of that input in future fuzzing attempts, provided that it should not be stored in the corpus, even if it uncovers new coverage; a return value of 0 signifies the opposite, while other values are reserved for future enhancements. The fuzz function is required to reside in a package that go-fuzz can recognize, meaning the code under test cannot be located within the main package, although fuzzing of internal packages is permitted. This structured approach ensures that the testing process remains efficient and focused on identifying vulnerabilities in the code.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

Free
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Battelle

Website

github.com/Battelle/afl-unicorn

Vendor Details

Company Name

dvyukov

Website

github.com/dvyukov/go-fuzz

Product Features

Product Features

Alternatives

Alternatives

Atheris Reviews

Atheris

Google
LibFuzzer Reviews

LibFuzzer

LLVM Project
UMT Unicorn 10 Reviews

UMT Unicorn 10

Usha Martin Technologies
ClusterFuzz Reviews

ClusterFuzz

Google