A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
https://github.com/secfigo/Awesome-Fuzzing
https://github.com/secfigo/Awesome-Fuzzing
GitHub
GitHub - secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials…
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Develo...
Modular And Compositional analysis with KLEE Engine https://github.com/tum-i22/macke #klee #symbolic #fuzzing
GitHub
GitHub - tum-i4/macke: Modular And Compositional analysis with KLEE Engine
Modular And Compositional analysis with KLEE Engine - tum-i4/macke
uniFuzzer combines LibFuzzer with Unicorn to fuzz closed source binaries, including Arm & Mips code!
https://github.com/rk700/uniFuzzer
https://github.com/rk700/uniFuzzer
GitHub
GitHub - PAGalaxyLab/uniFuzzer: A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer
A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer - GitHub - PAGalaxyLab/uniFuzzer: A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer
DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables https://github.com/googleprojectzero/DrSancov
GitHub
GitHub - googleprojectzero/DrSancov: DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables
DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables - googleprojectzero/DrSancov
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU
https://github.com/andreafioraldi/WineAFLplusplusDEMO #fuzzing
https://github.com/andreafioraldi/WineAFLplusplusDEMO #fuzzing
GitHub
GitHub - AFLplusplus/Fuzz-With-Wine-Demo: A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU - AFLplusplus/Fuzz-With-Wine-Demo
AFL in-memory fuzzing with Frida JS - absolutely useless
https://github.com/andreafioraldi/frida-js-afl-instr
https://github.com/andreafioraldi/frida-js-afl-instr
GitHub
GitHub - andreafioraldi/frida-js-afl-instr: An example on how to do performant in-memory fuzzing with AFL++ and Frida
An example on how to do performant in-memory fuzzing with AFL++ and Frida - andreafioraldi/frida-js-afl-instr
fzero_fuzzer
A fast Rust-based safe and thead-friendly grammar-based fuzz generator
https://github.com/gamozolabs/fzero_fuzzer
A fast Rust-based safe and thead-friendly grammar-based fuzz generator
https://github.com/gamozolabs/fzero_fuzzer
GitHub
GitHub - gamozolabs/fzero_fuzzer: A fast Rust-based safe and thead-friendly grammar-based fuzz generator
A fast Rust-based safe and thead-friendly grammar-based fuzz generator - gamozolabs/fzero_fuzzer
Frida API Fuzzer
This experimetal fuzzer is meant to be used for API in-memory fuzzing.
https://github.com/andreafioraldi/frida-fuzzer
This experimetal fuzzer is meant to be used for API in-memory fuzzing.
https://github.com/andreafioraldi/frida-fuzzer
GitHub
GitHub - andreafioraldi/frida-fuzzer: This experimetal fuzzer is meant to be used for API in-memory fuzzing.
This experimetal fuzzer is meant to be used for API in-memory fuzzing. - andreafioraldi/frida-fuzzer
Fuzzowski
The aim of this tool is to assist during the whole process of fuzzing a network protocol, allowing to define the communications, helping to identify the "suspects" of crashing a service, and much more
https://github.com/nccgroup/fuzzowski
The aim of this tool is to assist during the whole process of fuzzing a network protocol, allowing to define the communications, helping to identify the "suspects" of crashing a service, and much more
https://github.com/nccgroup/fuzzowski
GitHub
GitHub - nccgroup/fuzzowski: the Network Protocol Fuzzer that we will want to use.
the Network Protocol Fuzzer that we will want to use. - nccgroup/fuzzowski
Fuzzing software: common challenges and potential solutions (Part 1) https://securitylab.github.com/research/fuzzing-challenges-solutions-1
GitHub Security Lab
Fuzzing software: common challenges and potential solutions (Part 1)
Based on our security audit of VLC Media Player, we share some common fuzzing challenges, and practical ways to address them. Read on to discover a variety of fuzzing strategies.
