afl

Crates.ioafl
lib.rsafl
version0.15.11
sourcesrc
created_at2016-01-31 15:45:35.152188
updated_at2024-10-16 09:29:15.224355
descriptionFuzzing Rust code with american-fuzzy-lop
homepagehttps://github.com/rust-fuzz/afl.rs
repositoryhttps://github.com/rust-fuzz/afl.rs
max_upload_size
id4035
size1,496,165
Publishers (github:rust-fuzz:publishers)

documentation

README

afl.rs logo
afl.rs

Fuzzing Rust code with AFLplusplus

What is it?

Fuzz testing is a software testing technique used to find security and stability issues by providing pseudo-random data as input to the software. AFLplusplus is a popular, effective, and modern fuzz testing tool based on AFL. This library, afl.rs, allows one to run AFLplusplus on code written in the Rust programming language.

Documentation

Documentation can be found in the Rust Fuzz Book.

What does it look like?

Screen recording of afl

Screen recording of AFL running on Rust code.

Hints

Before starting to fuzz, you should reconfigure your system for optimal performance and better crash detection. This can be done with cargo afl system-config. But this subcommand requires root, so it uses sudo internally. Hence, you might need to enter your password.

By default, the AFL++ CMPLOG feature is activated, which helps to achieve good code coverage. However, it is not beneficial to activate CMPLOG on more than two instances. So if you run multiple AFL++ instances on your fuzzing target, you can disable CMPLOG by specifying the command line parameter '-c -'.

This document will familiarize you with AFL++ features to help in running a successful fuzzing campaign.

By default, the fuzzing config is set when cargo-afl is used to build. If you want to prevent this, just set the environment variable AFL_NO_CFG_FUZZING to 1 when building.

Commit count: 758

cargo fmt