-
I'm a student of Seoul National University(Korea), and I tried to fuzz this library(only for file analyzing, not for analyzing live communication) for exercise.. I think I found heap overflow and few …
-
Hi guys,
Nice work, one quick question, I noticed that in the source code, you used libFuzz as the input generation, can we switch to other fuzzers (e.g., AFL++) and use it for on-device fuzzing t…
-
This will have numerous benefits, including:
1. Opening up OSS-Fuzz to projects that are too stateful or hard to harness to be used effectively with libFuzzer style fuzzing.
2. Allowing more thoroug…
-
Discussed in #1 but big enough to warrant it's own issue.
The Boom team has a [repository of all deployed Stacks smart contracts](https://github.com/boomcrypto/clarity-deployed-contracts) but it is…
-
I'm a little confused about how can shellphuzz call driller, I can not find anywhere import driller module .
Also, I encountered a problem about using shellpuzz to do drilling job, while testing …
-
### Summary
Several use-of-uninitialised-memory bugs have been found after testing one of the harnesses provided on the OSS-Fuzz repository (inchi_input_fuzzer).
During our tests we found:
1. c…
-
Hi,
I ran afl-fuzz master and secondary instances. Both afl-fuzz and afl-showmap is in PATH. But while ruuning command `/.cargo/bin/symcc_fuzzing_helper -o afl_out -a afl-secondary -n symcc -- ../sym…
ghost updated
2 years ago
-
I tried the example in Readme and executed the following command:
```
afl-fuzz -i examples/test-network/in -o ./examples/test-network/out -- ./fpicker --fuzzer-mode afl -e attach -p test-network -f …
-
### Describe the bug
We found an invalid-read while testing one of the harnesses provided on the OSS-Fuzz repository (zeek-ftp-fuzzer). More specifically, when invoking the `sscanf()` function, the p…
-
## Feature Request
**Short Description**
KubeArmor is a security tool and thus security testing of KubeArmor itself is important/imperative.
Fuzz testing involves testing all/most combination…