afl (security-oriented fuzzer)
American fuzzy lop is a security-oriented fuzzer that employs a
novel type of compile-time instrumentation and genetic algorithms to
automatically discover clean, interesting test cases that trigger new
internal states in the targeted binary. This substantially improves the
functional coverage for the fuzzed code. The compact synthesized corpora
produced by the tool are also useful for seeding other, more labor-
or resource-intensive testing regimes down the road.
To use afl with binary-only code (no source available), a custom qemu
wrapper is used. This does NOT require a system-wide installation of
qemu, but it does require the source to qemu. To build qemu support,
download the qemu source from:
http://wiki.qemu-project.org/download/qemu-2.3.0.tar.bz2
Save the file in the same directory as the afl.SlackBuild script.
If binary-only support is not needed, don't download the qemu source. This
will speed up the build quite a bit.
Maintained by: B. Watson
Keywords: american fuzzy lop,fuzzer
ChangeLog: afl
Homepage:
http://lcamtuf.coredump.cx/afl/
Download SlackBuild:
afl.tar.gz
afl.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
afl.SlackBuild |
afl.info |
slack-desc |
© 2006-2018 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds
Web Design
by WebSight Designs |
Managed Hosting by OnyxLight Communications