go-fuzz

go-fuzz

dvyukov
+
+

Related Products

  • c/side
    7 Ratings
    Visit Website
  • NMIS
    14 Ratings
    Visit Website
  • SHIELD
    14 Ratings
    Visit Website
  • BytePlus Recommend
    1 Rating
    Visit Website
  • EasyDMARC
    149 Ratings
    Visit Website
  • Chainguard
    40 Ratings
    Visit Website
  • Blackbird API Development
    1 Rating
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website
  • Boozang
    15 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    526 Ratings
    Visit Website

About

FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses. FuzzDB contains comprehensive lists of attack payload primitives for fault injection testing. These patterns, categorized by the attack and where appropriate platform type, are known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, HTTP header crlf injections, SQL injection, NoSQL injection, and more. For example, FuzzDB catalogs 56 patterns that can potentially be interpreted as a null byte and contains lists of commonly used methods and name-value pairs that trigger debug modes.

About

Go-fuzz is a coverage-guided fuzzing solution for testing Go packages. Fuzzing is mainly applicable to packages that parse complex inputs (both text and binary) and is especially useful for hardening systems that parse inputs from potentially malicious users (anything accepted over a network). go-fuzz has recently added preliminary support for fuzzing Go Modules. If you encounter a problem with modules, please file an issue with details. Data is a random input generated by go-fuzz, note that in most cases it is invalid. The function must return 1 if the fuzzer should increase the priority of the given input during subsequent fuzzing if the input must not be added to the corpus even if it gives new coverage, and 0 otherwise; other values are reserved for future use. The fuzz function must be in a package that go-fuzz can import. This means the code you want to test can't be in package main. Fuzzing internal packages is supported, however.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone requiring a security scanner solution to test their application protocols

Audience

Developers looking for a solution to manage their network protocol fuzzing operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

Free
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

FuzzDB
github.com/fuzzdb-project/fuzzdb

Company Information

dvyukov
github.com/dvyukov/go-fuzz

Alternatives

Alternatives

LibFuzzer

LibFuzzer

LLVM Project
Honggfuzz

Honggfuzz

Google
API Fuzzer

API Fuzzer

Fuzzapi
CI Fuzz

CI Fuzz

Code Intelligence
Atheris

Atheris

Google
ClusterFuzz

ClusterFuzz

Google

Categories

Categories

Integrations

BlackArch Linux
NoSQL
OWASP ZAP

Integrations

BlackArch Linux
NoSQL
OWASP ZAP
Claim FuzzDB and update features and information
Claim FuzzDB and update features and information
Claim go-fuzz and update features and information
Claim go-fuzz and update features and information