#AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2025-05-30

Guess who just released #LibAFL 0.15.3?
That's right, you all did! (thank you☺️)

Highlights:

  • better forkserver
  • scriptable Lua mutations
  • SIMD performance in stable rust
  • CmpLog and RISC-V for LibAFL_Unicorn
  • TMin for LibAFL_QEMU
  • Updated Sugar for easy fuzzing

github.com/AFLplusplus/LibAFL/

#fuzzing #AFLplusplus #LibAFL #update

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2025-03-31

🚨 LibAFL 0.15.2 🚨

  • Rust 2024 edition
  • LibAFL_Unicorn
  • Use LibAFL rand types for other crates
  • Allow logging to StatsD
  • LibAFL_QEMU updates like binary-only ASan in Rust πŸ¦€πŸ¦€πŸ¦€, inputs via StdIn, better snapshots

And so much more:

github.com/AFLplusplus/LibAFL/

#LibAFL #Fuzzing #AFLplusplus

2024-07-08

is there a simple way to have the target binary dump it's own test-case while running from afl-fuzz #aflplusplus #afl++ - the thing is, the target binary generates some crypto keys at the start which are used later. i thought to have persistent mode first generate the internal state, then dump the message that is basis for fuzzing and that later in processing needs those keys. but when i run afl-fuzz it complains that the input directory is empty, and when i write the file it's not picked up...

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2024-01-06

Late last year we released #LibAFL 0.11.2
Highlights:

  • Unicode-preserving mutators, better mutations for text!
  • GSoC project: Nicer TUI
  • Scalability introspector
  • Improved libafl_frida
  • Extended libafl_qemu - added CmpLog and more!

Full changelog:
github.com/AFLplusplus/LibAFL/

#fuzzing #libafl #AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2023-12-30

If you want to play with the injection vulnerability detection feature shown at #37c3: for AFL++ read instrumentation/README.injections.md; for libafl_qemu check out the vhqemu branch and use fuzzers/qemu_launcher with "-y injections.yaml". #aflplusplus #afl #fuzzing #fuzzing-tools

2023-08-02

Fuzz your cargo-fuzz harness with LibAFL!

I'm happy to share the fuzz runtime described in our recent FUZZING'23 report, CrabSandwich, which expands on libafl_libfuzzer to allow for Rust support. This allows Rust developers to switch away from the now-in-stasis libFuzzer to a LibAFL-based runtime which supports most common features of libFuzzer seamlessly.

Want to try it out for yourself? Simply edit your existing cargo-fuzz harnesses' Cargo.toml to change the libfuzzer-sys dependency as shown here: github.com/rust-fuzz/cargo-fuz

In most cases, the entire edit is a single-line change (!). At this time, we only support Linux, but are looking for contributions to expand to Windows and macOS as well.

Happy hunting! #fuzzing #rust #libafl #AFLplusplus

:verified: domenukdmnk@infosec.exchange
2023-06-05

Almost a year after my defense, my PhD thesis "Automated Security Testing of Unexplored Targets Through Feedback-Guided Fuzzing" is now archived on the university server. πŸŽ‰
We fuzzed Nvidia drivers, tcp servers, basebands, WebAssembly,...

Enjoy reading :)

depositonce.tu-berlin.de/items

#fuzzing #AFLplusplus

Titlepage of the PhD defenseAbstract of the PhD defense (text, see link)
2023-03-05

Finally came around to do some #fuzzing on #sectxtlib with #AFLplusplus and directly found an issue in one of its dependencies πŸ”₯​

2023-02-15

@anfedotoff @aflplusplus Very cool!
I had the same realization and created a multi-fuzzer utility for Rust at work (@srlabs), using #AFLplusplus #honggfuzz and #libfuzzer in parallel.

github.com/srlabs/ziggy

2023-02-03

New casr 2.4.0 is available!
github.com/ispras/casr/release
casr-cli now provides a joint statistics all over reports!
casr-afl now copies crashes next to reports, produces casr reports in parallel and prints casr-cli joint statistics!
#casr #AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2023-01-31

LibAFL 0.9.0 is out with a new logoπŸ”₯

Highlights:
β†’ QEMU user-mode and system-mode snapshot fuzzing
β†’ Stable CorpusId when removing/updating entries in Corpus
β†’ Tinyinst binary-only instrumentation
β†’ Full support to AFL++ binaries with forkserver
...

github.com/AFLplusplus/LibAFL/

#fuzzing #libafl #AFLplusplus

2022-12-24

Checkout new #casr 2.3.0 release!!!
github.com/ispras/casr
- rust panic support in casr-san/casr-gdb
- c++ exceptions support in casr-san/casr-gdb
- casr-python for creating CASR reports from python crashesπŸ”₯​

P. S. Merry Christmas! ❄️​❄️​❄️​
#fuzzing #afl #aflplusplus #python

2022-11-23

I have a YouTube channel where I talk about fuzzing, please like subscribe and share:
youtube.com/@MrHardik05

#fuzzing #vulnerability #afl #AFLplusplus #libfuzzer #winafl #jackalope #honggfuzz

2022-11-21

At last, new casr 2.2.0 release with casr-afl!!!
Triaging crashes found by @aflplusplus as simple as it could be:
$ cargo install casr
$ casr-afl -i afl-out -o casr-out
$ casr-cli casr-out/cl1/<report_name>

github.com/ispras/casr

#casr #fuzzing #afl #AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2022-11-20

For binary-only emulation in #LibAFL qemu, you can now dump DrCov traces to see in #idapro (lighthouse), #binaryninja (bncov), or #ghidra (dragondance) which paths the executions took.

This helps you understand where your fuzzer gets stuck, develop the harness further, and reach greater depth in the binary, eventually.

Binary-only modes of #AFLplusplus ( #qemu / #frida ) and libafl_frida also support DrCov output, already.

#fuzzing #fuzzingTips
github.com/AFLplusplus/LibAFL/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst