Fuzzing/Fuzz testing
Fuzzing or fuzz testing is an automated software black box testing technique that evaluates the program's reaction to providing invalid, unexpected, or random data as inputs to a computer program.
Here are 1,147 public repositories matching this topic...
A directed fuzzer based on AFLplusplus making use of git commits to target most frequently, or recently, updated functions.
-
Updated
Jul 27, 2023 - C
Rudimentary network protocol fuzzer using bash, netcat, and other tools.
-
Updated
Mar 24, 2018 - Shell
Next generation CapSan for https://github.com/HexHive/Evocatio
-
Updated
Oct 31, 2023
Directory Bruteforce Tool written in Python
-
Updated
Jun 9, 2023 - Python
Swagger API 2.1 json of Postman fuzzing Variable setup tool
-
Updated
Jan 9, 2023 - Python
💔 List of domains using Cloudflare DNS (potentially affected by the CloudBleed HTTPS traffic leak)
-
Updated
Mar 7, 2017
A simple source code fuzzer (in Java) specifically built for NC State University's iTrust system.
-
Updated
May 3, 2017 - Java
🏃 GreenRun Fuzz Testing For BenchChain Libraries
-
Updated
May 7, 2018 - Go
fuzz system calls (add perturbations to software execution) through a loadable kernel module
-
Updated
Apr 8, 2020 - C
A security test tools programmed by demonalex and dedicated to SMTP authentication.
-
Updated
Oct 15, 2018 - Perl
Cīnās ar demences sekām, neiedziļinoties iemeslā.
-
Updated
May 20, 2020 - JavaScript
TL;DR: Mutate a binary to identify potential exploit candidates
-
Updated
Jul 22, 2023 - C
-
Updated
Apr 22, 2021
Created by Barton Miller
Released September 1988
- Followers
- 165 followers
- Website
- www.cs.wisc.edu/~bart/fuzz
- Wikipedia
- Wikipedia