All Projects → google → Clusterfuzz

google / Clusterfuzz

Licence: apache-2.0
Scalable fuzzing infrastructure.

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects
shell
77523 projects
Dockerfile
14818 projects
ANTLR
299 projects
powershell
5483 projects

Projects that are alternatives of or similar to Clusterfuzz

Oss Fuzz
OSS-Fuzz - continuous fuzzing for open source software.
Stars: ✭ 6,937 (+49.25%)
Mutual labels:  vulnerabilities, fuzzing, stability
PersonalStuff
This is a repo is to upload files done during my research.
Stars: ✭ 94 (-97.98%)
Mutual labels:  fuzzing, vulnerabilities
MsFontsFuzz
OpenType font file format fuzzer for Windows
Stars: ✭ 49 (-98.95%)
Mutual labels:  fuzzing, vulnerabilities
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (-79.04%)
Mutual labels:  vulnerabilities, fuzzing
clusterfuzzlite
ClusterFuzzLite - Simple continuous fuzzing that runs in CI.
Stars: ✭ 315 (-93.22%)
Mutual labels:  fuzzing, vulnerabilities
Afl Utils
Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization
Stars: ✭ 383 (-91.76%)
Mutual labels:  fuzzing
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-91.11%)
Mutual labels:  vulnerabilities
Poc
Advisories, proof of concept files and exploits that have been made public by @pedrib.
Stars: ✭ 376 (-91.91%)
Mutual labels:  vulnerabilities
Awesome Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Stars: ✭ 3,867 (-16.8%)
Mutual labels:  fuzzing
Qsym
QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
Stars: ✭ 459 (-90.12%)
Mutual labels:  fuzzing
Pwndoc
Pentest Report Generator
Stars: ✭ 417 (-91.03%)
Mutual labels:  vulnerabilities
Awesome Fuzzing
A curated list of awesome Fuzzing(or Fuzz Testing) for software security
Stars: ✭ 399 (-91.42%)
Mutual labels:  fuzzing
Opencve
CVE Alerting Platform
Stars: ✭ 384 (-91.74%)
Mutual labels:  vulnerabilities
Cb Multios
DARPA Challenges Sets for Linux, Windows, and macOS
Stars: ✭ 415 (-91.07%)
Mutual labels:  vulnerabilities
Fuzzdata
Fuzzing resources for feeding various fuzzers with input. 🔧
Stars: ✭ 376 (-91.91%)
Mutual labels:  fuzzing
Zip Slip Vulnerability
Zip Slip Vulnerability (Arbitrary file write through archive extraction)
Stars: ✭ 433 (-90.68%)
Mutual labels:  vulnerabilities
Grype
A vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-92.21%)
Mutual labels:  vulnerabilities
Advisory Db
Security advisory database for Rust crates published through crates.io
Stars: ✭ 396 (-91.48%)
Mutual labels:  vulnerabilities
Frida Fuzzer
This experimetal fuzzer is meant to be used for API in-memory fuzzing.
Stars: ✭ 415 (-91.07%)
Mutual labels:  fuzzing
Huskyci
Performing security tests inside your CI
Stars: ✭ 398 (-91.44%)
Mutual labels:  vulnerabilities

ClusterFuzz

ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software.

Google uses ClusterFuzz to fuzz all Google products and as the fuzzing backend for OSS-Fuzz.

ClusterFuzz provides many features which help seamlessly integrate fuzzing into a software project's development process:

Overview

Documentation

You can find detailed documentation here.

Trophies

As of February 2021, ClusterFuzz has found ~29,000 bugs in Google (e.g. Chrome) and 26,000+ bugs in over 400 open source projects integrated with OSS-Fuzz.

Getting Help

You can file an issue to ask questions, request features, or ask for help.

Staying Up to Date

We will use clusterfuzz-announce(#)googlegroups.com to make announcements about ClusterFuzz.

ClusterFuzzLite

For a more lightweight version of ClusterFuzz that runs on CI/CD systems, check out ClusterFuzzLite.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].