zjuchenyuan / Dockerized_fuzzing
Licence: mit
Run fuzzing experiments in Docker
Stars: ✭ 48
Labels
Projects that are alternatives of or similar to Dockerized fuzzing
Baresifter
A bare-metal x86 instruction set fuzzer a la Sandsifter
Stars: ✭ 33 (-31.25%)
Mutual labels: fuzzing
Paper collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+1379.17%)
Mutual labels: fuzzing
Packer Fuzzer
Packer Fuzzer is a fast and efficient scanner for security detection of websites constructed by javascript module bundler such as Webpack.
Stars: ✭ 753 (+1468.75%)
Mutual labels: fuzzing
Pbtk
A toolset for reverse engineering and fuzzing Protobuf-based apps
Stars: ✭ 791 (+1547.92%)
Mutual labels: fuzzing
Awesome Vulnerability Research
🦄 A curated list of the awesome resources about the Vulnerability Research
Stars: ✭ 658 (+1270.83%)
Mutual labels: fuzzing
Oss Fuzz
OSS-Fuzz - continuous fuzzing for open source software.
Stars: ✭ 6,937 (+14352.08%)
Mutual labels: fuzzing
Copy2java
一键生成Java代码的burp插件/Generate Java script for fuzzing in Burp。
Stars: ✭ 32 (-33.33%)
Mutual labels: fuzzing
Halfempty
A fast, parallel test case minimization tool.
Stars: ✭ 750 (+1462.5%)
Mutual labels: fuzzing
Angora
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
Stars: ✭ 669 (+1293.75%)
Mutual labels: fuzzing
Paramspider
Mining parameters from dark corners of Web Archives
Stars: ✭ 781 (+1527.08%)
Mutual labels: fuzzing
Afl Compiler Fuzzer
Variation of american fuzzy lop for testing compilers for C-like languages, revised by Alex Groce & collaborators to fuzz tools processing source code in C-like languages
Stars: ✭ 47 (-2.08%)
Mutual labels: fuzzing
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+1929.17%)
Mutual labels: fuzzing
dockerized_fuzzing
Run fuzzing within Docker. Currently we have incorporated 37 usable fuzzing tools.
This repo is part of UNIFUZZ. The corresponding paper will appear on USENIX Security 2021. Paper PDF
For citing this paper:
@inproceedings{unifuzz-li,
title={{UNIFUZZ}: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers},
author={Li, Yuwei and Ji, Shouling and Chen, Yuan and Liang, Sizhuang and Lee, Wei-Han and Chen, Yueyao and Lyu, Chenyang and Wu, Chunming and Beyah, Raheem and Cheng, Peng and Lu, Kangjie and Wang, Ting},
booktitle={Proceedings of the 30th {USENIX} Security Symposium},
year={2021},
}
Fuzzers
Welcome PR
We are willing to accept pull requests for new fuzzers! Please follow these instructions:
- Edit the above table to include your fuzzer name, DockerHub link, and type information.
- In your DockerHub README, provide guidance for using your fuzzer, detailed steps are appreciated (you can follow the guidance template of AFL).
- Provide Dockerfile for building the fuzzer.
- If your fuzzer requires customized compilation steps rather than just AFL-instrumentation, please also implement unibench_build Dockerfile for building 20 unibench programs, so that your fuzzer can be directly used for evaluation.
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].