About
ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software. Google uses ClusterFuzz to fuzz all Google products and as the fuzzing backend for OSS-Fuzz. ClusterFuzz provides many features to seamlessly integrate fuzzing into a software project’s development process. Fully automatic bug filing, triage, and closing for various issue trackers. Supports multiple coverages guided fuzzing engines for optimal results (with ensemble fuzzing and fuzzing strategies). Statistics for analyzing fuzzer performance, and crash rates. Easy to use web interface for management and viewing crashes. Support for various authentication providers using Firebase. Support for black-box fuzzing, test case minimization, and regression finding through bisection.
|
About
Honggfuzz is a security-oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW-based). It’s multi-process and multi-threaded, there’s no need to run multiple copies of your fuzzer, as Honggfuzz can unlock the potential of all your available CPU cores with a single running instance. The file corpus is automatically shared and improved between all fuzzed processes. It’s blazingly fast when the persistent fuzzing mode is used. A simple/empty LLVMFuzzerTestOneInput function can be tested with up to 1mo iteration per second on a relatively modern CPU. Has a solid track record of uncovered security bugs, the only (to date) vulnerability in OpenSSL with the critical score mark was discovered by Honggfuzz. As opposed to other fuzzers, it will discover and report hijacked/ignored signals from crashes (intercepted and potentially hidden by a fuzzed program).
|
About
LibFuzzer is an in-process, coverage-guided, evolutionary fuzzing engine. LibFuzzer is linked with the library under test, and feeds fuzzed inputs to the library via a specific fuzzing entry point (or target function); the fuzzer then tracks which areas of the code are reached, and generates mutations on the corpus of input data in order to maximize the code coverage. The code coverage information for libFuzzer is provided by LLVM’s SanitizerCoverage instrumentation. LibFuzzer is still fully supported in that important bugs will get fixed. The first step in using libFuzzer on a library is to implement a fuzz target, a function that accepts an array of bytes and does something interesting with these bytes using the API under test. Note that this fuzz target does not depend on libFuzzer in any way so it is possible and even desirable to use it with other fuzzing engines like AFL and/or Radamsa.
|
About
python-sql is a library to write SQL queries in a pythonic way. Simple selects, select with where condition. Select with join or select with multiple joins. Select with group_by and select with output name. Select with order_by, or select with sub-select. Select on other schema and insert query with default values. Insert query with values, and insert query with query. Update query with values. Update query with where condition. Update query with from the list. Delete query with where condition, and delete query with sub-query. Provides limit style, qmark style, and numeric style.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Developers in search a solution to manage their fuzzing testing processes
|
Audience
Anyone requiring a solution to detect coding errors and security vulnerabilities
|
Audience
Users requiring a fuzzing engine to analyze their code and applications
|
Audience
Developers searching for a solution offering a library to write SQL queries
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationGoogle
United States
google.github.io/clusterfuzz/
|
Company InformationGoogle
United States
github.com/google/honggfuzz
|
Company InformationLLVM Project
Founded: 2003
llvm.org/docs/LibFuzzer.html
|
Company InformationPython Software Foundation
United States
pypi.org/project/python-sql/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|
||||
|
|
|
|
|
|||
|
|
|
|
||||
|
|
|
|
||||
Categories |
Categories |
Categories |
Categories |
|||
Integrations
Atheris
C
C++
ClusterFuzz
Cygwin
Domino Enterprise MLOps Platform
Firebase
FreeBSD
Fuzzbuzz
Google ClusterFuzz
|
Integrations
Atheris
C
C++
ClusterFuzz
Cygwin
Domino Enterprise MLOps Platform
Firebase
FreeBSD
Fuzzbuzz
Google ClusterFuzz
|
Integrations
Atheris
C
C++
ClusterFuzz
Cygwin
Domino Enterprise MLOps Platform
Firebase
FreeBSD
Fuzzbuzz
Google ClusterFuzz
|
Integrations
Atheris
C
C++
ClusterFuzz
Cygwin
Domino Enterprise MLOps Platform
Firebase
FreeBSD
Fuzzbuzz
Google ClusterFuzz
|
|||
|
|
|
|
|