#aflplusplus

Want to learn how to build your own #libafl components, but never had the right project? Try working through the interactive exercises that I released today: https://github.com/addisoncrump/parking-game-fuzzer

You'll work through building your own LibAFL components with templates, allowing you to understand them progressively through the context of trying to solve "Tokyo Parking" (AKA Thinkfun's "Rush Hour") puzzles with fuzzing.

#fuzzing #aflplusplus #puzzles #rust #rustlang

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2025-05-30

Guess who just released #LibAFL 0.15.3?
That's right, you all did! (thank you☺️)

Highlights:

  • better forkserver
  • scriptable Lua mutations
  • SIMD performance in stable rust
  • CmpLog and RISC-V for LibAFL_Unicorn
  • TMin for LibAFL_QEMU
  • Updated Sugar for easy fuzzing

github.com/AFLplusplus/LibAFL/

#fuzzing #AFLplusplus #LibAFL #update

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2025-03-31

🚨 LibAFL 0.15.2 🚨

  • Rust 2024 edition
  • LibAFL_Unicorn
  • Use LibAFL rand types for other crates
  • Allow logging to StatsD
  • LibAFL_QEMU updates like binary-only ASan in Rust πŸ¦€πŸ¦€πŸ¦€, inputs via StdIn, better snapshots

And so much more:

github.com/AFLplusplus/LibAFL/

#LibAFL #Fuzzing #AFLplusplus

2024-07-08

is there a simple way to have the target binary dump it's own test-case while running from afl-fuzz #aflplusplus #afl++ - the thing is, the target binary generates some crypto keys at the start which are used later. i thought to have persistent mode first generate the internal state, then dump the message that is basis for fuzzing and that later in processing needs those keys. but when i run afl-fuzz it complains that the input directory is empty, and when i write the file it's not picked up...

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2024-01-06

Late last year we released #LibAFL 0.11.2
Highlights:

  • Unicode-preserving mutators, better mutations for text!
  • GSoC project: Nicer TUI
  • Scalability introspector
  • Improved libafl_frida
  • Extended libafl_qemu - added CmpLog and more!

Full changelog:
github.com/AFLplusplus/LibAFL/

#fuzzing #libafl #AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2023-12-30

If you want to play with the injection vulnerability detection feature shown at #37c3: for AFL++ read instrumentation/README.injections.md; for libafl_qemu check out the vhqemu branch and use fuzzers/qemu_launcher with "-y injections.yaml". #aflplusplus #afl #fuzzing #fuzzing-tools

2023-08-02

Fuzz your cargo-fuzz harness with LibAFL!

I'm happy to share the fuzz runtime described in our recent FUZZING'23 report, CrabSandwich, which expands on libafl_libfuzzer to allow for Rust support. This allows Rust developers to switch away from the now-in-stasis libFuzzer to a LibAFL-based runtime which supports most common features of libFuzzer seamlessly.

Want to try it out for yourself? Simply edit your existing cargo-fuzz harnesses' Cargo.toml to change the libfuzzer-sys dependency as shown here: github.com/rust-fuzz/cargo-fuz

In most cases, the entire edit is a single-line change (!). At this time, we only support Linux, but are looking for contributions to expand to Windows and macOS as well.

Happy hunting! #fuzzing #rust #libafl #AFLplusplus

:verified: domenukdmnk@infosec.exchange
2023-06-05

Almost a year after my defense, my PhD thesis "Automated Security Testing of Unexplored Targets Through Feedback-Guided Fuzzing" is now archived on the university server. πŸŽ‰
We fuzzed Nvidia drivers, tcp servers, basebands, WebAssembly,...

Enjoy reading :)

depositonce.tu-berlin.de/items

#fuzzing #AFLplusplus

Titlepage of the PhD defenseAbstract of the PhD defense (text, see link)
2023-03-05

Finally came around to do some #fuzzing on #sectxtlib with #AFLplusplus and directly found an issue in one of its dependencies πŸ”₯​

2023-02-15

@anfedotoff @aflplusplus Very cool!
I had the same realization and created a multi-fuzzer utility for Rust at work (@srlabs), using #AFLplusplus #honggfuzz and #libfuzzer in parallel.

github.com/srlabs/ziggy

2023-02-03

New casr 2.4.0 is available!
github.com/ispras/casr/release
casr-cli now provides a joint statistics all over reports!
casr-afl now copies crashes next to reports, produces casr reports in parallel and prints casr-cli joint statistics!
#casr #AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2023-01-31

LibAFL 0.9.0 is out with a new logoπŸ”₯

Highlights:
β†’ QEMU user-mode and system-mode snapshot fuzzing
β†’ Stable CorpusId when removing/updating entries in Corpus
β†’ Tinyinst binary-only instrumentation
β†’ Full support to AFL++ binaries with forkserver
...

github.com/AFLplusplus/LibAFL/

#fuzzing #libafl #AFLplusplus

2022-12-24

Checkout new #casr 2.3.0 release!!!
github.com/ispras/casr
- rust panic support in casr-san/casr-gdb
- c++ exceptions support in casr-san/casr-gdb
- casr-python for creating CASR reports from python crashesπŸ”₯​

P. S. Merry Christmas! ❄️​❄️​❄️​
#fuzzing #afl #aflplusplus #python

2022-11-23

I have a YouTube channel where I talk about fuzzing, please like subscribe and share:
youtube.com/@MrHardik05

#fuzzing #vulnerability #afl #AFLplusplus #libfuzzer #winafl #jackalope #honggfuzz

2022-11-21

At last, new casr 2.2.0 release with casr-afl!!!
Triaging crashes found by @aflplusplus as simple as it could be:
$ cargo install casr
$ casr-afl -i afl-out -o casr-out
$ casr-cli casr-out/cl1/<report_name>

github.com/ispras/casr

#casr #fuzzing #afl #AFLplusplus

Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2022-11-20

For binary-only emulation in #LibAFL qemu, you can now dump DrCov traces to see in #idapro (lighthouse), #binaryninja (bncov), or #ghidra (dragondance) which paths the executions took.

This helps you understand where your fuzzer gets stuck, develop the harness further, and reach greater depth in the binary, eventually.

Binary-only modes of #AFLplusplus ( #qemu / #frida ) and libafl_frida also support DrCov output, already.

#fuzzing #fuzzingTips
github.com/AFLplusplus/LibAFL/

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst