Compare the Top Fuzz Testing Tools that integrate with Google Chrome as of October 2025

This a list of Fuzz Testing tools that integrate with Google Chrome. Use the filters on the left to add additional filters for products that have integrations with Google Chrome. View the products that work with Google Chrome in the table below.

What are Fuzz Testing Tools for Google Chrome?

Fuzz testing tools are automated software tools used to detect bugs and vulnerabilities in computer systems. They generate large amounts of random input data to test the robustness of a system. These tools are commonly used in software development to enhance the quality and security of a product. Fuzz testing tools can be applied to various types of systems, including web applications, mobile apps, and operating systems. They have become an essential part of the testing process in modern software development due to their ability to uncover hidden flaws that traditional testing methods may miss. Compare and read user reviews of the best Fuzz Testing tools for Google Chrome currently available using the table below. This list is updated regularly.

  • 1
    BFuzz

    BFuzz

    RootUp

    BFuzz is an input-based fuzzer tool that takes HTML as an input, opens up your browser with a new instance, and passes multiple test cases generated by domato which is present in the recurve folder of BFuzz, more over BFuzz is an automation that performs the same task repeatedly and it doesn't mangle any test cases. Running BFuzz will ask for the option of whether to fuzz Chrome or Firefox, however, this will open Firefox from recurve and create the logs on the terminal. BFuzz is a small script that enables you to open the browser and run test cases. The test cases in recurve are generated by the domato generator and contain the main script. It contains additional helper code for DOM fuzzing.
    Starting Price: Free
  • 2
    Wapiti

    Wapiti

    Wapiti

    Wapiti is a web application vulnerability scanner. Wapiti allows you to audit the security of your websites or web applications. It performs "black-box" scans (it does not study the source code) of the web application by crawling the webpages of the deployed web app, looking for scripts and forms where it can inject data. Once it gets the list of URLs, forms, and their inputs, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. Search for potentially dangerous files on the server. Wapiti supports both GET and POST HTTP methods for attacks. It also supports multipart forms and can inject payloads in filenames (upload). Warnings are raised when an anomaly is found (for example 500 errors and timeouts). Wapiti is able to make the difference between permanent and reflected XSS vulnerabilities. Generates vulnerability reports in various formats (HTML, XML, JSON, TXT, CSV).
    Starting Price: Free
  • Previous
  • You're on page 1
  • Next