AndroFuzz
App fuzzer
A tool for fuzzing Android apps with generated files
A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process
39 stars
7 watching
6 forks
Language: Python
last commit: over 10 years ago Related projects:
Repository | Description | Stars |
---|---|---|
jtpereyda/boofuzz | A tool for generating and testing network protocol inputs to identify vulnerabilities | 2,057 |
quarkslab/android-fuzzing | A toolkit for greybox fuzzing of Android applications using AFL++ Frida mode | 109 |
googleprojectzero/fuzzilli | Automates the process of finding bugs in JavaScript engines by generating random code and testing it for errors | 1,896 |
antojoseph/droid-ff | A toolset for testing the security of Android applications by simulating various types of malformed input data | 85 |
googleprojectzero/jackalope | A customizable, distributed coverage-guided fuzzer for black-box binaries on multiple platforms. | 1,103 |
fuzzing/mffa | Automatically testing Android media software components for vulnerabilities by feeding malformed media files to them. | 332 |
google/fuzzbench | Automated testing of software components to identify vulnerabilities and weaknesses | 1,110 |
andresriancho/websocket-fuzzer | Automates the process of sending WebSocket messages to test application vulnerabilities | 144 |
google/atheris | A tool that uses fuzz testing to identify bugs in software by randomly generating input data | 1,412 |
ameenmaali/qsfuzz | A tool to help identify vulnerabilities in web applications by fuzzing query strings with custom rules. | 297 |
googleprojectzero/domato | A tool used to generate malformed HTML code to test web application security | 1,697 |
bhass1/pyfuzz_can | A tool for generating and testing random CAN network inputs to simulate real-world conditions. | 13 |
momalab/icsfuzz | A tool used to test security vulnerabilities in industrial control systems by injecting random data into their application code. | 26 |
gamozolabs/applepie | A tool designed to fuzz and introspect systems using a hypervisor, providing deep device emulation and code coverage analysis. | 367 |
battelle/sandsifter | Automates the discovery of hidden instructions and bugs in x86 processors | 490 |