If you want to use import "github.com/bnagy/crashwalk" in your own Go code, you can get godoc at: http://godoc.org/github.com/bnagy/crashwalk To run the standalone cwtriage tool: - cwtriage runs crashfiles with instrumentation and outputs results in various formats - Usage: cwtriage -root /path/to/afl-dir [-match pattern] -- /path/to/target -in @@ -out whatever ( @@ will be substituted for each crashfile ) - -afl Prefer the AFL recorded crashing command, if present - -engine string Debugging engine to use: [gdb lldb] (default "gdb") - -every int Run every n seconds (default -1) - -f string Template filename to use while running crash - -ignore string Directory skip pattern ( go regex syntax ) - -match string Match pattern for files ( go regex syntax ) - -mem int Memory limit for target processes (MB) (default -1) - -output string Output format to use: [json pb text] (default "text") - -root string Root directory to look for crashes - -seen Include seen results from the DB in the output - -seendb string Path to BoltDB (default "crashwalk.db") - -strict Abort the whole run if any crashes fail to repro - -t int Timeout for target processes (secs) (default 60) - -tidy Move crashes tha
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Mac OS X computer forensics tool for analyzing system artifacts, user files, and logs with reputation verification and log aggregation capabilities.
A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.
A library to access the Extensible Storage Engine (ESE) Database File (EDB) format used in various Windows applications.
Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.
A command-line utility for extracting human-readable text from binary files.
A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.
Web interface for the Volatility Memory Forensics Framework
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.