All Projects β†’ rust-fuzz β†’ targets

rust-fuzz / targets

Licence: CC0-1.0 license
🎯 A collection of fuzzing targets written in Rust.

Programming Languages

rust
11053 projects
SCSS
7915 projects

Projects that are alternatives of or similar to targets

Ansvif
A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.
Stars: ✭ 107 (+17.58%)
Mutual labels:  fuzzing, fuzz-testing
Pythonfuzz
coverage guided fuzz testing for python
Stars: ✭ 175 (+92.31%)
Mutual labels:  fuzzing, fuzz-testing
Aflplusplus
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Stars: ✭ 2,319 (+2448.35%)
Mutual labels:  fuzzing, fuzz-testing
Book
πŸ“– Guides and tutorials on how to fuzz Rust code
Stars: ✭ 67 (-26.37%)
Mutual labels:  fuzzing, fuzz-testing
Honggfuzz Rs
Fuzz your Rust code with Google-developed Honggfuzz !
Stars: ✭ 222 (+143.96%)
Mutual labels:  fuzzing, fuzz-testing
Awesome Directed Fuzzing
A curated list of awesome directed fuzzing research papers
Stars: ✭ 77 (-15.38%)
Mutual labels:  fuzzing, fuzz-testing
Libdiffuzz
Custom memory allocator that helps discover reads from uninitialized memory
Stars: ✭ 147 (+61.54%)
Mutual labels:  fuzzing, fuzz-testing
Fuzzingpaper
Recent Fuzzing Paper
Stars: ✭ 773 (+749.45%)
Mutual labels:  fuzzing, fuzz-testing
Fuzzit
CLI to integrate continuous fuzzing with Fuzzit
Stars: ✭ 220 (+141.76%)
Mutual labels:  fuzzing, fuzz-testing
Javafuzz
coverage guided fuzz testing for java
Stars: ✭ 193 (+112.09%)
Mutual labels:  fuzzing, fuzz-testing
Burpsuite Collections
BurpSuiteζ”Άι›†οΌšεŒ…ζ‹¬δΈι™δΊŽ Burp ζ–‡η« γ€η ΄θ§£η‰ˆγ€ζ’δ»Ά(非BApp Store)γ€ζ±‰εŒ–η­‰η›Έε…³ζ•™η¨‹οΌŒζ¬’θΏŽζ·»η –εŠ η“¦---burpsuite-pro burpsuite-extender burpsuite cracked-version hackbar hacktools fuzzing fuzz-testing burp-plugin burp-extensions bapp-store brute-force-attacks brute-force-passwords waf sqlmap jar
Stars: ✭ 1,081 (+1087.91%)
Mutual labels:  fuzzing, fuzz-testing
Certfuzz
This project contains the source code for the CERT Basic Fuzzing Framework (BFF) and the CERT Failure Observation Engine (FOE).
Stars: ✭ 233 (+156.04%)
Mutual labels:  fuzzing, fuzz-testing
Afl.rs
πŸ‡ Fuzzing Rust code with American Fuzzy Lop
Stars: ✭ 1,013 (+1013.19%)
Mutual labels:  fuzzing, fuzz-testing
Test Each
πŸ€– Repeat tests. Repeat tests. Repeat tests.
Stars: ✭ 89 (-2.2%)
Mutual labels:  fuzzing, fuzz-testing
Example Go
Go Fuzzit Example
Stars: ✭ 39 (-57.14%)
Mutual labels:  fuzzing, fuzz-testing
Snodge
Randomly mutate JSON, XML, HTML forms, text and binary data for fuzz testing
Stars: ✭ 121 (+32.97%)
Mutual labels:  fuzzing, fuzz-testing
Cargo Fuzz
Command line helpers for fuzzing
Stars: ✭ 725 (+696.7%)
Mutual labels:  fuzzing, fuzz-testing
Oss Fuzz
OSS-Fuzz - continuous fuzzing for open source software.
Stars: ✭ 6,937 (+7523.08%)
Mutual labels:  fuzzing, fuzz-testing
Sharpfuzz
AFL-based fuzz testing for .NET
Stars: ✭ 185 (+103.3%)
Mutual labels:  fuzzing, fuzz-testing
Trophy Case
πŸ† Collection of bugs uncovered by fuzzing Rust code
Stars: ✭ 225 (+147.25%)
Mutual labels:  fuzzing, fuzz-testing

targets

A collection of fuzzing targets written in Rust.

How do I fuzz?

This repository contains a small CLI tool to help you run our fuzzers. You can run it with cargo run (just like any other Rust tool). Here are some examples:

  • cargo run list-targets gives you a list of all fuzz targets
  • cargo run target pulldown_cmark_read runs the pulldown_cmark_read target with the default fuzzer
  • cargo run target pulldown_cmark_read --fuzzer libfuzzer runs the pulldown_cmark_read target with libfuzzer
  • cargo run continuously runs all targets (you can overwrite timeout per target and change the fuzzer)

For a complete list of available options, run cargo run -- help.

Contributing

Want to add another fuzz target? It can be for an existing crate or a new one, just open a pull request!

License

All files in this repository are licensed CC0.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].