Honggfuzz Logo

Honggfuzz

0
Free
Visit Website

A security oriented, feedback-driven, evolutionary, easy-to-use fuzzer with interesting analysis options. See the Usage document for a primer on Honggfuzz use. Latest stable version: 2.6 Changelog Installation: sudo apt-get install binutils-dev libunwind-dev libblocksruntime-dev clang make Features: - It's multi-process and multi-threaded: there's no need to run multiple copies of your fuzzer, as honggfuzz can unlock potential of all your available CPU cores with a single running instance. - The file corpus is automatically shared and improved between all fuzzed processes. - It's blazingly fast when the persistent fuzzing mode is used. A simple/empty LLVMFuzzerTestOneInput function can be tested with up to 1mo iterations per second on a relatively modern CPU (e.g. i7-6700K). - Has a solid track record of uncovered security bugs: the only (to the date) vulnerability in OpenSSL with the critical score mark was discovered by honggfuzz. See the Trophies paragraph for the summary of findings to the date. - Uses low-level interfaces to monitor processes (e.g. ptrace under Linux and NetBSD). As opposed to other fuzzers, it will discover and report hijacked/ignored signals.

FEATURES

ALTERNATIVES

An easy-to-use and lightweight API wrapper for Censys APIs with support for Python 3.8+.

A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.

The OWASP AppSec Europe '16 Conference is a leading gathering in web application security, featuring keynote speakers and in-depth trainings in application security topics.

A public domain for use in illustrative examples in documents.

A Python library for querying ThreatCrowd's API for email, IP, domain, and antivirus reports

AWS account compliance using centrally managed Config Rules

A lightweight CTF platform inspired by motherfuckingwebsite.com with a focus on challenge difficulty.

Script to verify audit settings for Microsoft Defender for Endpoint in GPO.

PINNED