ansvif, or A Not So Very Intelligent Fuzzer, suited to find bugs in code by throwing garbage arguments, files, and environment variables at the target program, that you may or may not have the source code to. It supports many features, such as buffer size, randomization of the buffer size, random data injection, templates, and much more. The purpose of this project is to identify bugs in software, specifically bugs that can induce a segmentation fault under various conditions. This aids security researchers in writing buffer overflows, input validation vulnerabilities, as well as helping one audit code for general logic mistakes.
Features
- code audit
- fault injection
- argument fuzzing
- environment variable fuzzing
- browser DOM fuzzing
- file fuzzing
- syscall fuzzing
- threaded
- templates
- man page parsing
- random data
- random buffer size
- segmentation fault/bus error/memory access violation, etc logging
- static strings
- always run a command at the end of the fuzz loop
- examples
License
GNU General Public License version 2.0 (GPLv2)Follow ansvif
You Might Also Like
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of ansvif!