πŸ“Š
RE & For & Crypto
test
Reverse Engineering
Reverse Engineering
  • About
  • Basic
    • Evasion Techniques
    • Assembler
      • IDE
      • Asm Language
  • PWN
    • ΠœΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π»Ρ‹ (эксплоиты с CTF ΠΈ Ρ‡ΡŒΠΈ-Ρ‚ΠΎ Π·Π°ΠΌΠ΅Ρ‚ΠΊΠΈ)
    • ВСория
      • Π’Π΅Ρ…Π½ΠΈΠΊΠ° Blind ROP
      • ΠšΡƒΡ€ΡΡ‹
      • Vulnerabilities
      • Π€ΡƒΠ½ΠΊΡ†ΠΈΠΈ
        • C++ memory corruption examples
        • snprintf
        • strncmp
    • Tools
      • ROP
  • Tools
    • By Languages
      • Go
      • Lua
      • Rust
      • Adobe Flash Player Apps (SWF)
    • Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ ΠΎ Π±ΠΈΠ½Π°Ρ€Π½ΠΎΠΌ Ρ„Π°ΠΉΠ»Π΅
    • ΠžΡ‚Π»Π°Π΄Ρ‡ΠΈΠΊΠΈ
    • ВрСйсСры
    • ΠŸΠ°ΠΊΠ΅Ρ€Ρ‹
    • Fuzzers
    • Editors
    • DBI
    • Sandbox
      • PyREBox
    • Decompilers & Disassemblers
      • RetDec
      • Capstone
      • Hopper
      • IDA
        • Some Tips & Tricks
        • IDA Python
      • dnSpy
      • Snowman
      • Analys Go Binaries
      • Ghidra
      • Radare2
    • Binary Parsing
      • LIEF
      • Yara
      • Angr
    • Steganography
    • Other
    • ΠžΠ±Ρ„ΡƒΡΠΊΠ°Ρ‚ΠΎΡ€Ρ‹
  • Windows
    • ASLR/DEP
    • Π Π°Π·Π»ΠΈΡ‡Π½Ρ‹Π΅ Π½Π΅Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Π΅ структуры
    • Windows API Hook
  • Firmware
    • OWASP Testing methodology
  • MacOS
    • Как ΡƒΠ²ΠΈΠ΄Π΅Ρ‚ΡŒ Π»ΠΎΠ³ΠΈ прилоТСния
    • Код ядра
Powered by GitBook
On this page
  1. Tools

Fuzzers

PreviousΠŸΠ°ΠΊΠ΅Ρ€Ρ‹NextEditors

Last updated 1 year ago

Π‘Ρ‚Π°Ρ‚ΡŒΡ ΠΏΡ€ΠΎ построСниС Ρ„Π΅Ρ€ΠΌΡ‹ для Ρ„Π°Π·Π·ΠΈΠ½Π³Π°:

Dockerfiles for some fuzzers:

WEIZZ: Automatic Grey-Box Fuzzing for Structured Binary Formats Slides: Video: Article: Code:

Fuzzing JavaScript Engines with Aspect-preserving Mutatio

Storm - a blackbox mutational fuzzer for detecting critical bugs in SMT solvers Article: Code:

UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

radamsa созданиС ΠΌΡƒΡ‚Π°Ρ†ΠΈΠΉ ΠΈΠ· ΠΏΡ€ΠΈΠΌΠ΅Ρ€ΠΎΠ² НапримСр:

# Generate 1000 example payloads
radamsa -n 1000 -o %n.txt example1.txt example2.txt

FLUFFI - Ρ„Ρ€Π΅ΠΉΠΌΠ²ΠΎΡ€ΠΊ для "пСнтСстров" для Ρ„Π°Π·Π·ΠΈΠ½Π³Π° Π±ΠΈΠ½Π°Ρ€Π΅ΠΉ

Π§Ρ‚ΠΎ спСциалисты ΠΈΠ· NCC Group использовали для Ρ„Π°Π·Π·ΠΈΠ½Π³Π° 5g protocols:

ClusterFuzz β€” Ρ„Π΅Ρ€ΠΌΠ° Ρ„Π°Π·Π·ΠΈΠ½Π³Π° ΠΎΡ‚ Google

OneFuzz β€” Ρ„Π΅Ρ€ΠΌΠ° Ρ„Π°Π·Π·ΠΈΠ½Π³Π° ΠΎΡ‚ Microsoft

valgrind, addrsanitizer, bullseye, svace, libfuzzer, statsviz, AFL++

https://habr.com/ru/company/dsec/blog/517596/
https://github.com/WiseSecurity/dockerized-fuzzers
https://andreafioraldi.github.io/assets/weizz-issta2020-slides.pdf
https://www.youtube.com/watch?v=MOeUqlFtgwE
https://andreafioraldi.github.io/assets/weizz-issta2020.pdf
https://github.com/andreafioraldi/weizz-fuzzer
https://github.com/sslab-gatech/DIE
https://numairmansur.github.io/STORM.pdf
https://github.com/Practical-Formal-Methods/storm
https://github.com/strongcourage/uafuzz
https://gitlab.com/akihe/radamsa
https://github.com/siemens/fluffi
https://research.nccgroup.com/2021/10/11/the-challenges-of-fuzzing-5g-protocols/