Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
American fuzzy lop is a security-focused fuzzer that utilizes a unique form of compile-time instrumentation along with genetic algorithms to automatically generate effective test cases that can uncover new internal states within the targeted binary. This approach significantly enhances the functional coverage of the code being fuzzed. Additionally, the compact and synthesized test cases produced by the tool can serve as a valuable resource for initiating other, more demanding testing processes in the future. Unlike many other instrumented fuzzers, afl-fuzz is engineered for practicality, boasting a minimal performance overhead while employing a diverse array of effective fuzzing techniques and strategies for minimizing effort. It requires almost no setup and can effortlessly manage complicated, real-world scenarios, such as those found in common image parsing or file compression libraries. As an instrumentation-guided genetic fuzzer, it excels at generating complex file semantics applicable to a wide variety of challenging targets, making it a versatile choice for security testing. Its ability to adapt to different environments further enhances its appeal for developers seeking robust solutions.
Description
Go-fuzz serves as a coverage-guided fuzzing tool designed specifically for testing Go packages, making it particularly effective for those that handle intricate inputs, whether they are textual or binary in nature. This method of testing is crucial for strengthening systems that need to process data from potentially harmful sources, such as network interactions. Recently, go-fuzz has introduced initial support for fuzzing Go Modules, inviting users to report any issues they encounter with detailed descriptions. It generates random input data, which is often invalid, and the function must return a value of 1 to indicate that the fuzzer should elevate the priority of that input in future fuzzing attempts, provided that it should not be stored in the corpus, even if it uncovers new coverage; a return value of 0 signifies the opposite, while other values are reserved for future enhancements. The fuzz function is required to reside in a package that go-fuzz can recognize, meaning the code under test cannot be located within the main package, although fuzzing of internal packages is permitted. This structured approach ensures that the testing process remains efficient and focused on identifying vulnerabilities in the code.
API Access
Has API
API Access
Has API
Integrations
C
C++
ClusterFuzz
FreeBSD
Go
Google ClusterFuzz
Java
NetBSD
OCaml
Objective-C
Integrations
C
C++
ClusterFuzz
FreeBSD
Go
Google ClusterFuzz
Java
NetBSD
OCaml
Objective-C
Pricing Details
Free
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Country
United States
Website
github.com/google/AFL
Vendor Details
Company Name
dvyukov
Website
github.com/dvyukov/go-fuzz