From 54132edee7385c4ffe7f8880d0b84c4e81cde7c8 Mon Sep 17 00:00:00 2001 From: Dobin Rutishauser Date: Fri, 4 May 2018 08:11:04 +0200 Subject: [PATCH 1/2] add network fuzzers, and a taint analysis framework --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index cf99e51..0e713ae 100644 --- a/README.md +++ b/README.md @@ -260,6 +260,12 @@ https://www.corelan.be/index.php/2013/02/26/root-cause-analysis-memory-corruptio [rage_fuzzer](https://github.com/deanjerkovich/rage_fuzzer) - A dumb protocol-unaware packet fuzzer/replayer. +[Fuzzotron](https://github.com/denandz/fuzzotron) - A simple network fuzzer supporting TCP, UDP and multithreading. + +[Mutiny](https://github.com/Cisco-Talos/mutiny-fuzzer) - The Mutiny Fuzzing Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. + +[Fuzzing For Worms](https://github.com/dobin/ffw) - A fuzzing framework for network servers. + ### Misc *Other notable fuzzers like Kernel Fuzzers, general purpose fuzzer etc.,* @@ -291,6 +297,8 @@ https://www.corelan.be/index.php/2013/02/26/root-cause-analysis-memory-corruptio [kfetch-toolkit](https://github.com/j00ru/kfetch-toolkit) - Tool to perform advanced logging of memory references performed by operating systems’ kernels +[moflow](https://github.com/vrtadmin/moflow) - A software security framework containing tools for vulnerability, discovery, and triage. + ### Symbolic Execution SAT and SMT Solvers [Z3](https://github.com/Z3Prover/z3) - A theorem prover from Microsoft Research. From 4f2a3aba911e4d8f98703f395e035c010171e96d Mon Sep 17 00:00:00 2001 From: Mohammed A Imran Date: Tue, 8 May 2018 14:33:57 +0800 Subject: [PATCH 2/2] remove Securitytube link and add irongeek link Removed http://www.securitytube.net/video/16939 as it was giving 500 errors and used irongeek's link instead --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 0e713ae..f859765 100644 --- a/README.md +++ b/README.md @@ -94,7 +94,7 @@ A curated list of fuzzing resources ( Books, courses - free and paid, videos, to [Coverage-based Greybox Fuzzing as Markov Chain](https://www.comp.nus.edu.sg/~mboehme/paper/CCS16.pdf) -[DerbyCon 2016: Fuzzing basics...or how to break software](http://www.securitytube.net/video/16939) +[DerbyCon 2016: Fuzzing basics...or how to break software](http://www.irongeek.com/i.php?page=videos/derbycon6/411-fuzzing-basicshow-to-break-software-grid-aka-scott-m) ## Tutorials and Blogs