Updating conversion, creating readmes
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Fuzzing [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Fuzzing [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;14m[1mFuzzing[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Fuzzing)[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mfuzz[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mautomated[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mtechnique[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12minvolves[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12minvalid,[39m[38;5;12m [39m[38;5;12munexpected,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mrandom[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12minputs[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12mprogram.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mprogram[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mmonitored[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mexceptions[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mcrashes,[39m[38;5;12m [39m[38;5;12mfailing[39m[38;5;12m [39m[38;5;12mbuilt-in[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12massertions,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mmemory[39m[38;5;12m [39m[38;5;12mleaks.[39m[38;5;12m [39m[38;5;12mTypically,[39m[38;5;12m [39m[38;5;12mfuzzers[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mtest[39m[38;5;12m [39m[38;5;12mprograms[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mtake[39m[38;5;12m [39m[38;5;12mstructured[39m[38;5;12m [39m[38;5;12minputs.[39m[38;5;12m [39m
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;14m[1mFuzzing[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Fuzzing)[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mfuzz[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mautomated[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mtechnique[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12minvolves[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12minvalid,[39m[38;5;12m [39m[38;5;12munexpected,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mrandom[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12minputs[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12mprogram.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mprogram[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mmonitored[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mexceptions[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mcrashes,[39m[38;5;12m [39m[38;5;12mfailing[39m[38;5;12m [39m[38;5;12mbuilt-in[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12massertions,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mmemory[39m[38;5;12m [39m[38;5;12mleaks.[39m[38;5;12m [39m[38;5;12mTypically,[39m[38;5;12m [39m[38;5;12mfuzzers[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mtest[39m[38;5;12m [39m[38;5;12mprograms[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mtake[39m[38;5;12m [39m[38;5;12mstructured[39m[38;5;12m [39m[38;5;12minputs.[39m[38;5;12m [39m
|
||||
|
||||
[38;5;12mA curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.[39m
|
||||
|
||||
@@ -83,8 +83,7 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mIJON: Exploring Deep State Spaces via Fuzzing, 2020[0m[38;5;12m (https://www.syssec.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2020/02/27/IJON-Oakland20.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mKrace: Data Race Fuzzing for Kernel File Systems, 2020[0m[38;5;12m (https://www.cc.gatech.edu/~mxu80/pubs/xu:krace.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPangolin:Incremental Hybrid Fuzzing with Polyhedral Path Abstraction, 2020[0m[38;5;12m (https://qingkaishi.github.io/public_pdfs/SP2020.pdf)[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mRetroWrite:[0m[38;5;14m[1m [0m[38;5;14m[1mStatically[0m[38;5;14m[1m [0m[38;5;14m[1mInstrumenting[0m[38;5;14m[1m [0m[38;5;14m[1mCOTS[0m[38;5;14m[1m [0m[38;5;14m[1mBinaries[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mFuzzing[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mSanitization,[0m[38;5;14m[1m [0m[38;5;14m[1m2020[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.semanticscholar.org/paper/RetroWrite%3A-Statically-Instrumenting-COTS-Binaries-Dinesh-Burow/845cafb153b0e4b9943c6d9b6a7e42c14845a0d6)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization, 2020[0m[38;5;12m (https://www.semanticscholar.org/paper/RetroWrite%3A-Statically-Instrumenting-COTS-Binaries-Dinesh-Burow/845cafb153b0e4b9943c6d9b6a7e42c14845a0d6)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFull-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing, 2019[0m[38;5;12m (https://www.computer.org/csdl/proceedings-article/sp/2019/666000b122/19skgbGVFEQ)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFuzzing File Systems via Two-Dimensional Input Space Exploration, 2019[0m[38;5;12m (https://www.computer.org/csdl/proceedings-article/sp/2019/666000a594/19skfLYOpaw)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNEUZZ: Efficient Fuzzing with Neural Program Smoothing, 2019[0m[38;5;12m (https://www.computer.org/csdl/proceedings-article/sp/2019/666000a900/19skg5XghG0)[39m
|
||||
@@ -144,8 +143,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mACM Conference on Computer and Communications Security (ACM CCS)[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mFuzz on the Beach: Fuzzing Solana Smart Contracts, 2023[0m[38;5;12m (https://arxiv.org/pdf/2309.03006.pdf)[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mNestFuzz:[0m[38;5;14m[1m [0m[38;5;14m[1mEnhancing[0m[38;5;14m[1m [0m[38;5;14m[1mFuzzing[0m[38;5;14m[1m [0m[38;5;14m[1mwith[0m[38;5;14m[1m [0m[38;5;14m[1mComprehensive[0m[38;5;14m[1m [0m[38;5;14m[1mUnderstanding[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mInput[0m[38;5;14m[1m [0m[38;5;14m[1mProcessing[0m[38;5;14m[1m [0m[38;5;14m[1mLogic,[0m[38;5;14m[1m [0m[38;5;14m[1m2023[0m[38;5;12m [39m
|
||||
[38;5;12m(https://secsys.fudan.edu.cn/_upload/article/files/56/ed/788960544d56a38258aca7d3c8b5/216e599a-d6f6-4308-aa0b-ef45166a8431.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic, 2023[0m[38;5;12m (https://secsys.fudan.edu.cn/_upload/article/files/56/ed/788960544d56a38258aca7d3c8b5/216e599a-d6f6-4308-aa0b-ef45166a8431.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mProfile-Driven System Optimizations for Accelerated Greybox Fuzzing, 2023[0m[38;5;12m (https://users.cs.utah.edu/~snagy/papers/23CCS.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHopper: Interpretative Fuzzing for Libraries, 2023[0m[38;5;12m (https://arxiv.org/pdf/2309.03496.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGreybox Fuzzing of Distributed Systems, 2023[0m[38;5;12m (https://arxiv.org/pdf/2305.02601.pdf)[39m
|
||||
@@ -215,24 +213,21 @@
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mTools[0m
|
||||
[38;5;12mInformation[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mleverage[39m[38;5;12m [39m[38;5;12mfuzz[39m[38;5;12m [39m[38;5;12mtesting.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mitems[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12msection[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12morganized[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mclassified[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mstandards[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mhttps://fuzzing-survey.org/[39m[38;5;12m [39m
|
||||
[38;5;12mwebsite.[39m[38;5;12m [39m[38;5;12mAlthough[39m[38;5;12m [39m[38;5;12mthere[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mcurrently[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12m35[39m[38;5;12m [39m[38;5;12mcategories,[39m[38;5;12m [39m[38;5;12mwe[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mselected[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mrelevant[39m[38;5;12m [39m[38;5;12mones[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12mefficient[39m[38;5;12m [39m[38;5;12minformation.[39m[38;5;12m [39m[38;5;12mAdditionally,[39m[38;5;12m [39m[38;5;12mitems[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12moutdated[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdeprecated[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mexcluded,[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12monly[39m[38;5;12m [39m[38;5;12mthose[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mcurrently[39m[38;5;12m [39m[38;5;12musable[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mlisted.[39m
|
||||
[38;5;12mInformation[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mleverage[39m[38;5;12m [39m[38;5;12mfuzz[39m[38;5;12m [39m[38;5;12mtesting.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mitems[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12msection[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12morganized[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mclassified[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mstandards[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mhttps://fuzzing-survey.org/[39m[38;5;12m [39m[38;5;12mwebsite.[39m[38;5;12m [39m[38;5;12mAlthough[39m[38;5;12m [39m[38;5;12mthere[39m[38;5;12m [39m[38;5;12mare[39m
|
||||
[38;5;12mcurrently[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12m35[39m[38;5;12m [39m[38;5;12mcategories,[39m[38;5;12m [39m[38;5;12mwe[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mselected[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mrelevant[39m[38;5;12m [39m[38;5;12mones[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12mefficient[39m[38;5;12m [39m[38;5;12minformation.[39m[38;5;12m [39m[38;5;12mAdditionally,[39m[38;5;12m [39m[38;5;12mitems[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12moutdated[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdeprecated[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mexcluded,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12monly[39m[38;5;12m [39m[38;5;12mthose[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mcurrently[39m[38;5;12m [39m[38;5;12musable[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mlisted.[39m
|
||||
[38;2;255;187;0m[4mFile[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mAFL++[0m[38;5;12m (https://github.com/AFLplusplus/AFLplusplus) - AFL++ is a superior fork to Google's AFL - more speed, more and better mutations, more and better instrumentation, custom module support, etc.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mAngora[0m[38;5;12m [39m[38;5;12m(https://github.com/AngoraFuzzer/Angora)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAngora[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mmutation-based[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mguided[39m[38;5;12m [39m[38;5;12mfuzzer.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mmain[39m[38;5;12m [39m[38;5;12mgoal[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mAngora[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mincrease[39m[38;5;12m [39m[38;5;12mbranch[39m[38;5;12m [39m[38;5;12mcoverage[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12msolving[39m[38;5;12m [39m[38;5;12mpath[39m[38;5;12m [39m[38;5;12mconstraints[39m[38;5;12m [39m[38;5;12mwithout[39m[38;5;12m [39m[38;5;12msymbolic[39m[38;5;12m [39m
|
||||
[38;5;12mexecution.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAngora[0m[38;5;12m (https://github.com/AngoraFuzzer/Angora) - Angora is a mutation-based coverage guided fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.[39m
|
||||
[38;2;255;187;0m[4mKernel[0m
|
||||
[38;2;255;187;0m[4mNetwork[0m
|
||||
[38;2;255;187;0m[4mAPI[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mIvySyn[0m[38;5;12m (https://gitlab.com/brown-ssl/ivysyn) - IvySyn is a fully-automated framework for discovering memory error vulnerabilities in Deep Learning (DL) frameworks.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mMINER[0m[38;5;12m [39m[38;5;12m(https://github.com/puppet-meteor/MINER)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMINER[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mREST[39m[38;5;12m [39m[38;5;12mAPI[39m[38;5;12m [39m[38;5;12mfuzzer[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mdata-driven[39m[38;5;12m [39m[38;5;12mdesigns[39m[38;5;12m [39m[38;5;12mworking[39m[38;5;12m [39m[38;5;12mtogether[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mguide[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msequence[39m[38;5;12m [39m[38;5;12mgeneration,[39m[38;5;12m [39m[38;5;12mimprove[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mrequest[39m[38;5;12m [39m[38;5;12mgeneration[39m[38;5;12m [39m[38;5;12mquality,[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mcapture[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12munique[39m[38;5;12m [39m[38;5;12merrors[39m[38;5;12m [39m[38;5;12mcaused[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mincorrect[39m[38;5;12m [39m[38;5;12mparameter[39m[38;5;12m [39m[38;5;12musage.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mMINER[0m[38;5;12m [39m[38;5;12m(https://github.com/puppet-meteor/MINER)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMINER[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mREST[39m[38;5;12m [39m[38;5;12mAPI[39m[38;5;12m [39m[38;5;12mfuzzer[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mthree[39m[38;5;12m [39m[38;5;12mdata-driven[39m[38;5;12m [39m[38;5;12mdesigns[39m[38;5;12m [39m[38;5;12mworking[39m[38;5;12m [39m[38;5;12mtogether[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mguide[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msequence[39m[38;5;12m [39m[38;5;12mgeneration,[39m[38;5;12m [39m[38;5;12mimprove[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mrequest[39m[38;5;12m [39m[38;5;12mgeneration[39m[38;5;12m [39m[38;5;12mquality,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcapture[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12munique[39m[38;5;12m [39m
|
||||
[38;5;12merrors[39m[38;5;12m [39m[38;5;12mcaused[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mincorrect[39m[38;5;12m [39m[38;5;12mparameter[39m[38;5;12m [39m[38;5;12musage.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRestTestGen[0m[38;5;12m (https://github.com/SeUniVr/RestTestGen) - RestTestGen is a robust tool and framework designed for automated black-box testing of RESTful web APIs.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGraphFuzz[0m[38;5;12m (https://github.com/ForAllSecure/GraphFuzz) - GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMinerva[0m[38;5;12m (https://github.com/ChijinZ/Minerva) - Minerva is a browser fuzzer augmented by API mod-ref relations, aiming to synthesize highly-relevant browser API invocations in each test case.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFANS[0m[38;5;12m [39m[38;5;12m(https://github.com/iromise/fans)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFANS[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfuzzing[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mfuzzing[39m[38;5;12m [39m[38;5;12mAndroid[39m[38;5;12m [39m[38;5;12mnative[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12mservices.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mcontains[39m[38;5;12m [39m[38;5;12mfour[39m[38;5;12m [39m[38;5;12mcomponents:[39m[38;5;12m [39m[38;5;12minterface[39m[38;5;12m [39m[38;5;12mcollector,[39m[38;5;12m [39m[38;5;12minterface[39m[38;5;12m [39m[38;5;12mmodel[39m[38;5;12m [39m[38;5;12mextractor,[39m[38;5;12m [39m[38;5;12mdependency[39m[38;5;12m [39m[38;5;12minferer,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mfuzzer[39m[38;5;12m [39m[38;5;12mengine.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFANS[0m[38;5;12m (https://github.com/iromise/fans) - FANS is a fuzzing tool for fuzzing Android native system services. It contains four components: interface collector, interface model extractor, dependency inferer, and fuzzer engine.[39m
|
||||
[38;2;255;187;0m[4mJavaScript[0m
|
||||
[38;2;255;187;0m[4mFirmware[0m
|
||||
[38;2;255;187;0m[4mHypervisor[0m
|
||||
@@ -244,8 +239,7 @@
|
||||
[38;2;255;187;0m[4mLib[0m
|
||||
[38;2;255;187;0m[4mWeb[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mTEFuzz[0m[38;5;12m (https://github.com/seclab-fudan/TEFuzz/) - TEFuzz is a tailored fuzzing-based framework to facilitate the detection and exploitation of template escape bugs.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWitcher[0m[38;5;12m [39m[38;5;12m(https://github.com/sefcom/Witcher)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWitcher[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mfuzzer[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mmutational[39m[38;5;12m [39m[38;5;12mfuzzing[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexplore[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mfault[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdetect[39m[38;5;12m [39m[38;5;12mcommand[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSQL[39m[38;5;12m [39m[38;5;12minjection[39m[38;5;12m [39m
|
||||
[38;5;12mvulnerabilities.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWitcher[0m[38;5;12m (https://github.com/sefcom/Witcher) - Witcher is a web application fuzzer that utilizes mutational fuzzing to explore web applications and fault escalation to detect command and SQL injection vulnerabilities.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCorbFuzz[0m[38;5;12m (https://github.com/shouc/corbfuzz) - CorbFuzz is a state-aware fuzzer for generating as much reponses from a web application as possible without need of setting up database, etc.[39m
|
||||
[38;2;255;187;0m[4mDOM[0m
|
||||
[38;2;255;187;0m[4mArgument[0m
|
||||
|
||||
Reference in New Issue
Block a user