Displaying 1 to 7 from 7 results

syzkaller - syzkaller is an unsupervised, coverage-guided Linux system call fuzzer


syzkaller is an unsupervised coverage-guided Linux kernel fuzzer.The project mailing list is syzkaller@googlegroups.com. You can subscribe to it with a google account or by sending an email to syzkaller+subscribe@googlegroups.com.

clusterfuzz-tools - Bugs are inevitable. Suffering is optional.


The tools supports various tasks (e.g. reproduce a crash locally) needed by ClusterFuzz's users.Currently, it supports reproducing a crash locally. In the future, it will support uploading a fuzzer, tailing fuzzer log, and uploading a testcase.

fuzzer - a mutating fuzzer for testing


A fuzzer for testing. This implements mutation fuzzing, in which an expect input is mutated (changed) many times in order to trigger unexpected behavior or crashes.Generate a mutated version of an object. This does not modify the object directly, but returns a modified copy. This mutation will increment and decrement numbers, randomize arrays, remove properties, and more.

checkers - Property-based testing for JavaScript via ClojureScript's test.check


Property-based testing for JavaScript via ClojureScript's test.check. test.check is a Clojure property-based testing tool inspired by QuickCheck. The core idea of test.check is that instead of enumerating expected input and output for unit tests, you write properties about your function that should hold true for all inputs. This lets you write concise, powerful tests.




node-radamsa - A simple, synchronous, pipe to Radamsa tool from your nodejs programs.


A synchronous pipe to Radamsa tool from your nodejs programs. The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

gray_hat_csharp_code - This repository contains full code examples from the book Gray Hat C#


This repository contains fully-fleshed out code examples from the book Gray Hat C#. In this book, a wide variety of security oriented tools and libraries will be written using the C# programming language, allowing for cross-platform automation of the most crucial aspects of a security engineer's roles in a modern organization. Many of the topics will also be highly useful for hobbyists and security enthusiasts who are looking to gain more experience with common security concepts and tools with real world examples for both offensive and defensive purposes. We cover a broad slice of concepts a modern security engineer must be familiar with, starting with a brief introduction to the C# language. After the introduction, we focus on fuzzing web application vulnerabilities and writing exploits for them. This is followed by C# payloads for pentesters to use for remote command execution and persistence. Then, we move onto security tool automation using true APIs, not just calling programs from the system shell. Finally, we focus on reverse engineering and forensics in the final chapters.