Home

Awesome

<h1 align="center"> <a href="https://github.com/frewsxcv/afl.rs/issues/66"><img src="etc/logo.gif" alt="afl.rs logo"></a> <br> afl.rs </h1> <h4 align="center">Fuzzing <a href="https://www.rust-lang.org">Rust</a> code with <a href="https://aflplus.plus/">AFLplusplus</a></h4>

What is it?

Fuzz testing is a software testing technique used to find security and stability issues by providing pseudo-random data as input to the software. AFLplusplus is a popular, effective, and modern fuzz testing tool based on AFL. This library, afl.rs, allows one to run AFLplusplus on code written in the Rust programming language.

Documentation

Documentation can be found in the Rust Fuzz Book.

What does it look like?

<img src="etc/screencap.gif" width="563" height="368" alt="Screen recording of afl">

Screen recording of AFL running on Rust code.

Hints

Before starting to fuzz, you should reconfigure your system for optimal performance and better crash detection. This can be done with cargo afl system-config. But this subcommand requires root, so it uses sudo internally. Hence, you might need to enter your password.

By default, the AFL++ CMPLOG feature is activated, which helps to achieve good code coverage. However, it is not beneficial to activate CMPLOG on more than two instances. So if you run multiple AFL++ instances on your fuzzing target, you can disable CMPLOG by specifying the command line parameter '-c -'.

This document will familiarize you with AFL++ features to help in running a successful fuzzing campaign.

By default, the fuzzing config is set when cargo-afl is used to build. If you want to prevent this, just set the environment variable AFL_NO_CFG_FUZZING to 1 when building.