Honggfuzz

Honggfuzz

Google
LibFuzzer

LibFuzzer

LLVM Project
+
+

Related Products

  • Digital WarRoom
    55 Ratings
    Visit Website
  • Forethought
    166 Ratings
    Visit Website
  • AlsoThere
    1 Rating
    Visit Website
  • Viktor
    17 Ratings
    Visit Website
  • Filerev
    3 Ratings
    Visit Website
  • TradingView Stock Widgets
    16 Ratings
    Visit Website
  • WinningBidder.com
    158 Ratings
    Visit Website
  • Striven
    232 Ratings
    Visit Website
  • RaimaDB
    12 Ratings
    Visit Website
  • Fax.Cloud
    1 Rating
    Visit Website

About

Honggfuzz is a security-oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW-based). It’s multi-process and multi-threaded, there’s no need to run multiple copies of your fuzzer, as Honggfuzz can unlock the potential of all your available CPU cores with a single running instance. The file corpus is automatically shared and improved between all fuzzed processes. It’s blazingly fast when the persistent fuzzing mode is used. A simple/empty LLVMFuzzerTestOneInput function can be tested with up to 1mo iteration per second on a relatively modern CPU. Has a solid track record of uncovered security bugs, the only (to date) vulnerability in OpenSSL with the critical score mark was discovered by Honggfuzz. As opposed to other fuzzers, it will discover and report hijacked/ignored signals from crashes (intercepted and potentially hidden by a fuzzed program).

About

LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine. LibFuzzer is linked with the library under test, and feeds fuzzed inputs to the library via a specific fuzzing entry point (or target function); the fuzzer then tracks which areas of the code are reached, and generates mutations on the corpus of input data in order to maximize the code coverage. The code coverage information for libFuzzer is provided by LLVM’s SanitizerCoverage instrumentation. LibFuzzer is still fully supported in that important bugs will get fixed. The first step in using libFuzzer on a library is to implement a fuzz target, a function that accepts an array of bytes and does something interesting with these bytes using the API under test. Note that this fuzz target does not depend on libFuzzer in any way so it is possible and even desirable to use it with other fuzzing engines like AFL and/or Radamsa.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone requiring a solution to detect coding errors and security vulnerabilities

Audience

Users requiring a fuzzing engine to analyze their code and applications

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

Free
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Google
United States
github.com/google/honggfuzz

Company Information

LLVM Project
Founded: 2003
llvm.org/docs/LibFuzzer.html

Alternatives

LibFuzzer

LibFuzzer

LLVM Project

Alternatives

afl-unicorn

afl-unicorn

Battelle
Atheris

Atheris

Google
Atheris

Atheris

Google
Jazzer

Jazzer

Code Intelligence
go-fuzz

go-fuzz

dvyukov
Honggfuzz

Honggfuzz

Google
ClusterFuzz

ClusterFuzz

Google

Categories

Categories

Integrations

ClusterFuzz
Google ClusterFuzz
Atheris
C
C++
Cygwin
FreeBSD
Fuzzbuzz
Jazzer
NetBSD
OpenSSL

Integrations

ClusterFuzz
Google ClusterFuzz
Atheris
C
C++
Cygwin
FreeBSD
Fuzzbuzz
Jazzer
NetBSD
OpenSSL
Claim Honggfuzz and update features and information
Claim Honggfuzz and update features and information
Claim LibFuzzer and update features and information
Claim LibFuzzer and update features and information