Crashwalk is a Go-based tool designed for analyzing crash files generated by fuzzing tools like AFL (American Fuzzy Lop). The tool consists of both a Go library and a standalone command-line utility called cwtriage. The cwtriage component runs crash files with instrumentation to reproduce crashes and analyze their characteristics. It supports multiple debugging engines including GDB and LLDB for crash analysis. The tool can process crash files from AFL directories and provides pattern matching capabilities to filter specific files or directories. Key features include configurable timeout and memory limits for target processes, multiple output formats (JSON, Protocol Buffers, text), and database integration using BoltDB to track previously analyzed crashes. The tool can run continuously at specified intervals and includes options for strict mode operation that aborts if crashes fail to reproduce. Crashwalk integrates with fuzzing workflows by automatically processing crash files and generating detailed reports about crash reproducibility and characteristics. It supports template-based crash file handling and can move processed crashes for organization purposes.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A program to manage yara ruleset in a database with support for different databases and configuration options.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A .NET assembly debugger and editor that enables reverse engineering and dynamic analysis of compiled .NET applications without source code access.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.