Skip to content

zjuchenyuan/dockerized_fuzzing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

dockerized_fuzzing

Run fuzzing within Docker. Currently we have incorporated 37 usable fuzzing tools.

This repo is part of UNIFUZZ. The corresponding paper will appear on USENIX Security 2021. Paper PDF

For citing this paper:

@inproceedings{unifuzz-li,
	title={{UNIFUZZ}: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers},
	author={Li, Yuwei and Ji, Shouling and Chen, Yuan and Liang, Sizhuang  and  Lee, Wei-Han and Chen, Yueyao and Lyu, Chenyang and Wu, Chunming and Beyah, Raheem and Cheng, Peng and Lu, Kangjie and Wang, Ting},
	booktitle={Proceedings of  the  30th {USENIX} Security Symposium},
	year={2021},
}

Fuzzers

Name Official Website Mutation/Generation Directed/Coverage Source Code/Binary
AFL http://lcamtuf.coredump.cx/afl/ Mutation Coverage Both
AFLFast https://github.com/mboehme/aflfast Mutation Coverage Both
AFLGo https://github.com/aflgo/aflgo Mutation Directed Source
AFLPIN https://github.com/mothran/aflpin Mutation Coverage Binary
AFLSmart https://github.com/aflsmart/aflsmart Mutation Coverage Both
Angora https://github.com/AngoraFuzzer/Angora Mutation Coverage Both
CodeAlchemist https://github.com/SoftSec-KAIST/CodeAlchemist Generation n.a. Binary
DIE https://github.com/sslab-gatech/DIE Mutation Coverage Source
Driller https://github.com/shellphish/driller Mutation Coverage Binary
Domato https://github.com/googleprojectzero/domato Generation n.a. Binary
Dharma https://github.com/MozillaSecurity/dharma Generation n.a. Binary
Eclipser https://github.com/SoftSec-KAIST/Eclipser Mutation Coverage Source
EcoFuzz https://github.com/MoonLight-SteinsGate/EcoFuzz Mutation Coverage Both
FairFuzz https://github.com/carolemieux/afl-rb Mutation Coverage Source
Fuzzilli https://github.com/googleprojectzero/fuzzilli Mutation Coverage Source
Grammarinator https://github.com/renatahodovan/grammarinator Generation n.a. Binary
Honggfuzz https://github.com/google/honggfuzz Mutation Coverage Source
IJON https://github.com/RUB-SysSec/ijon Mutation Coverage Source
Jsfuzz https://github.com/fuzzitdev/jsfuzz Mutation Coverage Source
jsfunfuzz https://github.com/MozillaSecurity/funfuzz Generation n.a. Binary
MoonLight https://gitlab.anu.edu.au/lunar/moonlight n.a. n.a. n.a.
MOPT https://github.com/puppet-meteor/MOpt-AFL Mutation Coverage Both
NAUTILUS https://github.com/RUB-SysSec/nautilus Both Coverage Source
NEUZZ https://github.com/Dongdongshe/neuzz Mutation Coverage Source
NEZHA https://github.com/nezha-dt/nezha Mutation Coverage LibFuzzer
LearnAFL https://github.com/MoonLight-SteinsGate/LearnAFL Mutation Coverage Source
radamsa https://gitlab.com/akihe/radamsa Mutation Coverage Binary
slowfuzz https://github.com/nettrino/slowfuzz Mutation n.a. LibFuzzer
Superion https://github.com/zhunki/Superion Both Coverage Source
T-Fuzz https://github.com/HexHive/T-Fuzz Mutation Coverage Source
QSYM https://github.com/sslab-gatech/qsym Mutation Coverage Binary
QuickFuzz https://github.com/CIFASIS/QuickFuzz Both n.a. Binary
Orthrus https://github.com/test-pipeline/orthrus n.a. n.a. n.a.
Peach https://github.com/MozillaSecurity/peach Generation n.a. Binary
PTfuzz https://github.com/hunter-ht-2018/ptfuzzer Mutation Coverage Source
VUzzer64 https://github.com/vusec/vuzzer64 Mutation Coverage Binary
zzuf https://github.com/samhocevar/zzuf Mutation n.a. Binary

Welcome PR

We are willing to accept pull requests for new fuzzers! Please follow these instructions:

  1. Edit the above table to include your fuzzer name, DockerHub link, and type information.
  2. In your DockerHub README, provide guidance for using your fuzzer, detailed steps are appreciated (you can follow the guidance template of AFL).
  3. Provide Dockerfile for building the fuzzer.
  4. If your fuzzer requires customized compilation steps rather than just AFL-instrumentation, please also implement unibench_build Dockerfile for building 20 unibench programs, so that your fuzzer can be directly used for evaluation.

About

Run fuzzing experiments in Docker

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published