Radamsa

Radamsa

Aki Helin
go-fuzz

go-fuzz

dvyukov
+
+

Related Products

  • Lockbox LIMS
    63 Ratings
    Visit Website
  • JetBrains Junie
    2 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • Global App Testing
    59 Ratings
    Visit Website
  • Epicor Connected Process Control
    4 Ratings
    Visit Website
  • qTest
    Visit Website
  • QBench
    132 Ratings
    Visit Website
  • Logility
    375 Ratings
    Visit Website
  • Melio
    2,175 Ratings
    Visit Website
  • Partful
    17 Ratings
    Visit Website

About

Radamsa is a test case generator for robustness testing or fuzzer. It is typically used to test how well a program can withstand malformed and potentially malicious inputs. It works by reading sample files of valid data and generating interestingly different outputs from them. The main selling points of Radamsa are that it has already found a slew of bugs in programs that actually matter, it is easily scriptable, and, easy to get up and running. Fuzzing is one of the techniques to find unexpected behavior in programs. The idea is simply to subject the program to various kinds of inputs and see what happens. There are two parts to this process: getting the various kinds of inputs and how to see what happens. Radamsa is a solution to the first part, and the second part is typically a short shell script. Testers usually have a more or less vague idea of what should not happen, and they try to find out if this is so.

About

Go-fuzz is a coverage-guided fuzzing solution for testing Go packages. Fuzzing is mainly applicable to packages that parse complex inputs (both text and binary) and is especially useful for hardening systems that parse inputs from potentially malicious users (anything accepted over a network). go-fuzz has recently added preliminary support for fuzzing Go Modules. If you encounter a problem with modules, please file an issue with details. Data is a random input generated by go-fuzz, note that in most cases it is invalid. The function must return 1 if the fuzzer should increase the priority of the given input during subsequent fuzzing if the input must not be added to the corpus even if it gives new coverage, and 0 otherwise; other values are reserved for future use. The fuzz function must be in a package that go-fuzz can import. This means the code you want to test can't be in package main. Fuzzing internal packages is supported, however.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Testers searching for a solution to find issues in their program processes and applications

Audience

Developers looking for a solution to manage their network protocol fuzzing operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

Free
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Aki Helin
gitlab.com/akihe/radamsa

Company Information

dvyukov
github.com/dvyukov/go-fuzz

Alternatives

Alternatives

LibFuzzer

LibFuzzer

LLVM Project
Honggfuzz

Honggfuzz

Google
go-fuzz

go-fuzz

dvyukov
ClusterFuzz

ClusterFuzz

Google
Atheris

Atheris

Google
ClusterFuzz

ClusterFuzz

Google

Categories

Categories

Integrations

FreeBSD
Git
Make
OpenBSD

Integrations

FreeBSD
Git
Make
OpenBSD
Claim Radamsa and update features and information
Claim Radamsa and update features and information
Claim go-fuzz and update features and information
Claim go-fuzz and update features and information