Searched +full:fuzz +full:- +full:seconds (Results 1 – 25 of 115) sorted by relevance
12345
3 . ./test-pre.sh6 test -z "$AFL_CC" && {16 test -e ../afl-qemu-trace && {17 cc -pie -fPIE -o test-instr ../test-instr.c18 cc -o test-compcov test-compcov.c19 test -e test-instr -a -e test-compcov && {21 mkdir -p in23 $ECHO "$GREY[*] running afl-fuzz for qemu_mode, this will take approx 10 seconds"25 ../afl-fuzz -m ${MEM_LIMIT} -V07 -Q -i in -o out -- ./test-instr >>errors 2>&127 test -n "$( ls out/default/queue/id:000002* 2>/dev/null )" && {[all …]
3 . ./test-pre.sh6 test -d ../unicorn_mode/unicornafl -a -e ../unicorn_mode/unicornafl/Makefile && {7 …test -e ../unicorn_mode/samples/python_simple/simple_target.bin -a -e ../unicorn_mode/samples/comp…13 PYTHONS="`command -v python3` `command -v python` `command -v python2`"17 if $PYTHON -c "import setuptools" ; then28 … echo "[-] Error: Python setup-tools not found. Run 'sudo apt-get install python-setuptools'."36 … $ECHO "$GREY[*] running afl-fuzz for unicorn_mode (persistent), this will take approx 25 seconds"37 …AFL_DEBUG_CHILD=1 ../../../afl-fuzz -m none -V15 -U -i sample_inputs -o out -d -- ./harness @@ >>e…38 test -n "$( ls out/default/queue/id:000002* 2>/dev/null )" && {39 $ECHO "$GREEN[+] afl-fuzz is working correctly with unicorn_mode (persistent)"[all …]
3 . ./test-pre.sh6 test -z "$AFL_CC" && {16 test -e ../afl-frida-trace.so && {17 cc -no-pie -o test-instr ../test-instr.c18 cc -o test-compcov test-compcov.c19 test -e test-instr -a -e test-compcov && {21 mkdir -p in23 $ECHO "$GREY[*] running afl-fuzz for frida_mode, this will take approx 10 seconds"25 …AFL_DEBUG=1 AFL_FRIDA_VERBOSE=1 ../afl-fuzz -m ${MEM_LIMIT} -V07 -O -i in -o out -- ./test-instr >…27 test -n "$( ls out/default/queue/id:000002* 2>/dev/null )" && {[all …]
3 . ./test-pre.sh8 test -e test-custom-mutator.c -a -e ${CUSTOM_MUTATOR_PATH}/example.c -a -e ${CUSTOM_MUTATOR_PATH}/e…11 test -e ../afl-clang-fast && {12 ../afl-clang-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&114 test -e ../afl-gcc-fast && {15 ../afl-gcc-fast -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&117 ../afl-gcc -o test-custom-mutator test-custom-mutator.c > /dev/null 2>&121 test -e ../afl-clang-fast && {22 ../afl-clang-fast -o test-multiple-mutators test-multiple-mutators.c > /dev/null 2>&124 test -e ../afl-gcc-fast && {[all …]
7 test -z "$FILE" && FILE=.afl_performance9 test -e $FILE || {11 echo Press ENTER to continue or CONTROL-C to abort15 test -e ./test-performance.sh || { echo Error: this script must be run from the directory in which …37 test -e /usr/local/bin/opt && {40 # on MacOS X we prefer afl-clang over afl-gcc, because41 # afl-gcc does not work there42 test `uname -s` = 'Darwin' -o `uname -s` = 'FreeBSD' && {43 AFL_GCC=afl-clang46 AFL_GCC=afl-gcc[all …]
1 name: OSS-Fuzz2 permissions: read-all7 - master9 - include/**10 - src/**11 - tests/**.cpp12 - tests/**.h15 runs-on: ubuntu-latest17 - name: Build Fuzzers19 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master[all …]
5 runs-on: ubuntu-latest7 - name: Build Fuzzers8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master10 oss-fuzz-project-name: 'capstone'11 dry-run: false12 - name: Run Fuzzers13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master15 oss-fuzz-project-name: 'capstone'16 fuzz-seconds: 60017 dry-run: false[all …]
5 runs-on: ubuntu-latest7 - name: Build Fuzzers8 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master10 oss-fuzz-project-name: 'brotli'11 dry-run: false12 - name: Run Fuzzers13 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master15 oss-fuzz-project-name: 'brotli'16 fuzz-seconds: 60017 dry-run: false[all …]
5 runs-on: ubuntu-latest7 - name: Build Fuzzers9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master11 oss-fuzz-project-name: 'pcre2'12 dry-run: false13 - name: Run Fuzzers14 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master16 oss-fuzz-project-name: 'pcre2'17 fuzz-seconds: 30018 dry-run: false[all …]
5 runs-on: ubuntu-latest7 - name: Build Fuzzers9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master11 oss-fuzz-project-name: 'gson'12 dry-run: false14 - name: Run Fuzzers15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master17 oss-fuzz-project-name: 'gson'18 fuzz-seconds: 60019 dry-run: false[all …]
5 runs-on: ubuntu-latest7 - name: Build Fuzzers9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master11 oss-fuzz-project-name: 'libusb'12 dry-run: false14 - name: Run Fuzzers15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master17 oss-fuzz-project-name: 'libusb'18 fuzz-seconds: 60019 dry-run: false[all …]
9 runs-on: ubuntu-latest11 - name: Build Fuzzers13 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master15 oss-fuzz-project-name: 'harfbuzz'16 dry-run: false17 - name: Run Fuzzers18 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master20 oss-fuzz-project-name: 'harfbuzz'21 fuzz-seconds: 60022 dry-run: false[all …]
5 runs-on: ubuntu-latest7 - name: Build Fuzzers9 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master11 oss-fuzz-project-name: 'jsoup'12 dry-run: false14 - name: Run Fuzzers15 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master17 oss-fuzz-project-name: 'jsoup'18 fuzz-seconds: 60019 dry-run: false[all …]
5 runs-on: ubuntu-latest10 - name: Build Fuzzers12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master14 oss-fuzz-project-name: 'libavc'16 - name: Run Fuzzers17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master19 oss-fuzz-project-name: 'libavc'21 fuzz-seconds: 60022 - name: Upload Crash23 uses: actions/upload-artifact@v3
5 runs-on: ubuntu-latest10 - name: Build Fuzzers12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master14 oss-fuzz-project-name: 'libultrahdr'16 - name: Run Fuzzers17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master19 oss-fuzz-project-name: 'libultrahdr'21 fuzz-seconds: 60022 - name: Upload Crash23 uses: actions/upload-artifact@v3
5 runs-on: ubuntu-latest10 - name: Build Fuzzers12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master14 oss-fuzz-project-name: 'libxaac'16 - name: Run Fuzzers17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master19 oss-fuzz-project-name: 'libxaac'21 fuzz-seconds: 60022 - name: Upload Crash23 uses: actions/upload-artifact@v3
5 runs-on: ubuntu-latest10 - name: Build Fuzzers12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master14 oss-fuzz-project-name: 'libmpeg2'16 - name: Run Fuzzers17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master19 oss-fuzz-project-name: 'libmpeg2'21 fuzz-seconds: 60022 - name: Upload Crash23 uses: actions/upload-artifact@v3
5 runs-on: ubuntu-latest10 - name: Build Fuzzers12 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master14 oss-fuzz-project-name: 'libhevc'16 - name: Run Fuzzers17 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master19 oss-fuzz-project-name: 'libhevc'21 fuzz-seconds: 60022 - name: Upload Crash23 uses: actions/upload-artifact@v3
9 runs-on: ubuntu-latest11 - name: Build fuzzers13 …uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@92182553173581f871130c71c71b17f003d47b0a …15 oss-fuzz-project-name: 'fmt'16 dry-run: false18 - name: Run fuzzers19 …uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@92182553173581f871130c71c71b17f003d47b0a # …21 oss-fuzz-project-name: 'fmt'22 fuzz-seconds: 30023 dry-run: false[all …]
1 ---2 # https://google.github.io/oss-fuzz/getting-started/continuous-integration/7 - master10 - master13 runs-on: ubuntu-latest16 fail-fast: false20 - name: Build Fuzzers (${{ matrix.sanitizer }})22 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master24 oss-fuzz-project-name: 'libbpf'25 dry-run: false[all …]
12 runs-on: ubuntu-latest15 group: ${{ github.workflow }}-${{ github.ref }}16 cancel-in-progress: true19 - name: Build Fuzzers21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master23 oss-fuzz-project-name: 'scapy'25 dry-run: false26 allowed-broken-targets-percentage: 027 - name: Run Fuzzers28 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master[all …]
6 - master7 - 1.3.x10 runs-on: ubuntu-latest12 fail-fast: false16 - name: Build Fuzzers (${{ matrix.sanitizer }})18 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master20 oss-fuzz-project-name: 'flac'23 - name: Run Fuzzers (${{ matrix.sanitizer }})24 uses: google/oss-fuzz/infra/cifuzz/actions/run_fuzzers@master26 oss-fuzz-project-name: 'flac'[all …]
1 ---6 - master9 - master12 runs-on: ubuntu-latest15 fail-fast: false19 - name: Build Fuzzers (${{ matrix.sanitizer }})21 uses: google/oss-fuzz/infra/cifuzz/actions/build_fuzzers@master23 oss-fuzz-project-name: 'selinux'24 dry-run: false25 allowed-broken-targets-percentage: 0[all …]
3 # american fuzzy lop++ - status check tool4 # ----------------------------------------9 # Copyright 2019-2024 AFLplusplus Project. All rights reserved.15 # https://www.apache.org/licenses/LICENSE-2.017 # This tool summarizes the status of any locally-running synchronized18 # instances of afl-fuzz.21 test "$1" = "-h" -o "$1" = "-hh" && {22 echo "$0 status check tool for afl-fuzz by Michal Zalewski"24 echo "Usage: $0 [-s] [-d] afl_output_directory"27 echo " -d - include dead fuzzer stats"[all …]
11 to fuzz a larger, more complex set of Chromium code, we usually need an entire12 browser process environment around us. The browser process takes seconds to15 We now have an experimental 'in process fuzz test' framework which attempts to:17 * Execute lots of fuzz cases in that pre-existing browser.18 This _may_ amortize the start up cost sufficiently to make such coverage-guided22 # Writing an in process fuzz case26 must override the `Fuzz` method. You'll find that your base class inherits32 # Running such an in process fuzz case41 `my_fuzzer /tmp/corpus -rss_limit_mb=81920`45 out-of-process co-ordinator.[all …]