| commit | 188694ce03e8938d057781d415864a6546e69250 | [log] [tgz] |
|---|---|---|
| author | Robert Swiecki <robert@swiecki.net> | Sat Dec 20 17:31:57 2025 +0100 |
| committer | Robert Swiecki <robert@swiecki.net> | Sat Dec 20 17:31:57 2025 +0100 |
| tree | 6fe91dba0ee0e1a0b679ace67084b95cddc88b4a | |
| parent | 6dff0a7e34681b5998ce721f5891f70fc1d92674 [diff] |
Readme - categorized
A security-oriented, feedback-driven, evolutionary fuzzer.
Honggfuzz is a general-purpose fuzzer that uses code coverage (software and hardware-based) to find bugs. It is multi-process, multi-threaded, and supports persistent fuzzing for extreme speed.
ptrace) to detect hijacked signals and hidden crashes.Linux (Ubuntu/Debian)
sudo apt-get install binutils-dev libunwind-dev libblocksruntime-dev clang
macOS Requires Xcode (10.8+) and libblocksruntime.
make # Compilation wrappers are created in hfuzz_cc/
Use the provided compiler wrappers to automatically add instrumentation:
# C code ./hfuzz_cc/hfuzz-clang -o my_target my_target.c # C++ code ./hfuzz_cc/hfuzz-clang++ -o my_target my_target.cpp
Point it to an input corpus directory (can be empty) and your binary:
# Basic run ./honggfuzz -i input_dir/ -- ./my_target ___FILE___ # Persistent mode (faster) ./honggfuzz -P -i input_dir/ -- ./my_target
Note: ___FILE___ is a placeholder for the input filename generated by honggfuzz.
For advanced examples (Apache, OpenSSL, BIND, etc.), check the examples/ directory.
See USAGE.md for detailed options.
Honggfuzz has discovered major security vulnerabilities in critical software.
regex, h2, sleep-parser, lewton(See OSS-Fuzz for hundreds more)
honggfuzz-rs crate for fuzzing Rust code.Apache License 2.0.
This is NOT an official Google product