coyote

Concurrency tester

A tool for testing concurrent C# code to find bugs before deploying in production

Coyote is a library and tool for testing concurrent C# code and deterministically reproducing bugs.

GitHub

1k stars
38 watching
77 forks
Language: C#
last commit: 3 months ago
Linked from 1 awesome list

coyotedotnetfuzzingsoftware-reliabilitysystematic-testingtestingtesting-tools

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
dotnet/crank A benchmarking infrastructure tool for .NET applications 990
anthonylloyd/cscheck A C# random testing library with generators and shrinkers for property-based testing of .NET code. 162
comparethemarket/fettle An experimental tool for testing C# code by intentionally changing it to see if tests can detect the changes 66
stryker-mutator/stryker-net A tool for testing .NET projects by introducing temporary bugs to verify test reliability and effectiveness 1,782
microsoft/dev-proxy A tool for simulating APIs to test applications before they reach production. 532
datomic/cassandracas A tool that simulates concurrent updates to Cassandra databases using compare-and-swap operations. 2
parapluu/concuerror An Erlang-based tool to systematically test programs for concurrency errors 333
ideawu/c1000k A tool to test an OS's capacity to handle 1 million concurrent network connections. 601
jhalterman/concurrentunit A toolkit for testing concurrent and asynchronous code without dependencies 420
aflnet/aflnet A fuzzer that uses a greybox approach to test network protocol implementations 872
barrucadu/dejafu A unit-testing library for concurrent Haskell programs 195
concurrencylabs/locust-cloudwatch A tool to publish load test results as CloudWatch metrics from Locust test scripts 30
dariusz-wozniak/list-of-testing-tools-and-frameworks-for-.net A comprehensive list of tools and frameworks for automated testing in .NET 550
petabridge/nbench A performance benchmarking and testing framework for .NET applications. 533
nccgroup/freddy A tool to detect and exploit deserialization vulnerabilities in Java and .NET applications. 573