BFuzz Description
BFuzz uses an input-based fuzzer that accepts HTML as input, opens a new browser instance and runs multiple test cases created by domato, which is located in the recurve directory of BFuzz. BFuzz also automates the same tasks repeatedly without affecting any test cases. BFuzz asks you to choose whether to fuzz Firefox or Chrome. However, it will open Firefox using recurve, and create logs in the terminal. BFuzz allows you to open a browser and run testcases. The test cases generated by domato contain the main script. It contains additional code for DOM fuzzing.
BFuzz Alternatives
Echidna
Echidna is a Haskell program designed for fuzzing/property-based testing of Ethereum smart contracts. It uses sophisticated grammar based fuzzing campaigns, based on an ABI contract, to falsify user defined predicates or Solidity statements. Echidna was designed with modularity in the mind. It can be easily expanded to include new mutations, or test specific contracts for specific cases. It generates inputs that are tailored to your code. Use optional corpus collection, mutation and guidance to find deeper bugs. Powered by Slither, to extract useful information prior to the fuzzing campaigns. Source code integration for identifying which lines have been covered after the fuzzing campaign. Interactive terminal UI with text-only output or JSON. Automatic test case minimization to speed up triage. Integration into the development workflow is seamless. Reporting of maximum gas usage during the fuzzing campaign. Support for the complex contract initialization process with Etheno, Truffle.
Learn more
beSTORM
Without access to source code, discover and certify security weaknesses in any product. Any protocol or hardware can be tested with beSTORM. This includes those used in IoT and process control, CANbus-compatible automotive and aerospace. Realtime fuzzing is possible without needing access to the source code. There are no cases to download. One platform, one GUI to use, with more than 250+ pre-built protocol testing modules, and the ability to create custom and proprietary ones. Identify security flaws before deployment. These are the ones that are most commonly discovered by outside actors after release. In your own testing center, certify vendor components and your applications. Software module self-learning and propriety testing. Scalability and customization for all business sizes. Automate the generation and delivery of near infinite attack vectors. Also, document any product failures. Record every pass/fail and manually engineer the exact command that caused each failure.
Learn more
Defensics Fuzz Testing
Defensics Fuzz Testing, a comprehensive and versatile automated black box fuzzer, allows organizations to discover and remediate software security flaws efficiently and effectively. The generational fuzzer takes a targeted, intelligent approach to negative testing. Users can create their own test cases using advanced file and protocol template fuzzers. The SDK allows users to create their own test cases using the Defensics Framework. Defensics runs as a black-box fuzzer. It does not require source code. Defensics allows users to secure their cyber supply chains, ensuring interoperability, robustness and quality of software and devices, before introducing them in IT or lab environments. Defensics is compatible with any development workflow in a traditional SDL environment or a CI environment. Its API and export capabilities allow it to integrate with surrounding technology, making it a plug-and-play fuzzer.
Learn more
Honggfuzz
Honggfuzz, a software fuzzer focusing on security, is available. Supports evolutionary feedback-driven fuzzing (SW and Hardware-based) based on code cover. Honggfuzz is multi-processed and multi-threaded. You don't need to run multiple instances of your fuzzer as it can unlock all of your CPU cores. The file corpus will be automatically shared and improved among all fuzzed process. When persistent fuzzing is used, it's lightning fast. A simple/empty LLVMFuzzerTestOneInput function can be tested with up to 1mo iteration per second on a relatively modern CPU. Honggfuzz has a track record of discovering security bugs. The only vulnerability (to date) in OpenSSL that received the critical score was discovered by Honggfuzz. It will report hijacked/ignored crashes signals (intercepted by a fuzzed application and potentially hidden).
Learn more
Pricing
Pricing Starts At:
Free
Free Version:
Yes
Integrations
Company Details
Company:
RootUp
Website:
github.com/RootUp/BFuzz
Recommended Products
Our Free Plans just got better! | Auth0 by Okta
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Product Details
Platforms
Windows
Mac
Linux
Type of Training
Documentation
Customer Support
Online
BFuzz Features and Options
BFuzz User Reviews
Write a Review- Previous
- Next