eec2c38a68
symqemu fix
2023-05-18 12:29:43 +02:00
401d7617ef
symqemu mutator options
2023-05-18 10:50:10 +02:00
abd6eace9d
improved symqemu custom mutator
2023-05-18 10:32:15 +02:00
f664eb58c5
fix debug build
2023-05-17 19:21:41 +02:00
3e3adb4d37
enforce python setting detection
2023-05-17 18:39:54 +02:00
1d0694df86
add symqemu custom mutator
2023-05-17 15:25:26 +02:00
dfdc6fd12c
add missing envs in the docs
2023-05-16 14:54:02 +02:00
49997e60cb
fix
2023-05-16 12:33:58 +02:00
1ad63a6a32
fix tritondse
2023-05-16 12:20:58 +02:00
6d23df2c7c
add target_intelligence
2023-05-15 17:13:28 +02:00
d91f8fa655
Merge branch 'stable' into dev
2023-05-15 11:51:20 +03:00
7f636dbfc2
add @responsefile support for afl-cc
2023-05-12 15:58:20 +02:00
93c821aaa3
afl-clang-lto incomptable with -flto=thin
2023-05-12 08:39:11 +02:00
a752b15921
update qemu_mode
2023-05-12 08:29:31 +02:00
3a98d7af18
qemuafl: Persistent mode for PPC32 targets
2023-05-11 21:02:46 +02:00
eaf59d5a19
next steps for tritondse
2023-05-11 07:55:17 +02:00
70da0c2e40
better tritondse support
2023-05-10 16:09:18 +02:00
c97caa6e10
fix makefile
2023-05-09 14:17:09 +02:00
c092892488
disable macos in the ci, works fine for me
2023-05-06 09:26:24 +02:00
001d9d3d20
GNUmakefile: Update LLVM instructions ( #1728 )
...
Update LLVM instructions, because versions higher than 14 are supported and to be explicit that LLD is also required
2023-05-05 16:02:00 +02:00
2c421d48fa
update libnyx ( #1727 )
2023-05-05 14:08:01 +02:00
f585f26266
tritondse fixes
2023-05-05 14:04:53 +02:00
396157deda
tritondse custom mutator attempt
2023-05-05 13:53:05 +02:00
f516926f00
afl-fuzz.c: Document -i - in --help ( #1725 )
...
afl-fuzz.c: Document `-i -` in `--help`, to write that `-i` can be passed '-' to resume the prior fuzzing job. Also reference AFL_AUTORESUME so users know they can set that parameter to sidestep the issue entirely.
2023-05-04 17:23:30 +02:00
a7b7f3cde9
fix afl-system-config for macos
2023-05-02 18:25:56 +02:00
22db79aefa
fix reallocs
2023-05-01 15:07:57 +02:00
2cd07abca9
Should memset EFF_ALEN(len) of eff_map ( #1722 )
2023-05-01 13:12:05 +02:00
fcab3ec990
docs
2023-05-01 08:55:37 +02:00
9065d4ba86
fix effector map
2023-05-01 08:38:13 +02:00
ed96f9b209
add frida mode tutorial
2023-04-28 16:02:09 +02:00
f567a89dae
more llvm 17
2023-04-28 15:39:01 +02:00
00c86b7cb1
llvm 17 changes
2023-04-28 14:56:52 +02:00
74be9ab5ce
llvm 17 changes
2023-04-28 14:55:35 +02:00
5813a4319c
doc, code format
2023-04-28 11:42:21 +02:00
e956f23a77
Source Code Coverage support for Nyx (Part 1) ( #1720 )
...
* Additional source code reformatting in afl-compiler-rt
* Add source code coverage support to afl-compiler-rt (for use with Nyx)
2023-04-28 11:35:22 +02:00
41b0fe7280
afl-showmap: Start a only a single fork server ( #1718 )
...
A forkserver is started by afl_fsrv_get_mapsize() when dynamically
finding the map size. When an input directory option is specified a
second fork server was also started. This commit re-arranges the inits
for several forkserver struct members so that we can re-use the server
started by the get_mapsize() call when not in coresight/qemu/unicorn
modes and just start the server otherwise.
2023-04-27 18:57:55 +02:00
6cad585bdc
nits
2023-04-27 18:57:28 +02:00
6172bc7312
Add "Hangs saved" to afl-whatsup ( #1717 )
...
The hangs could show long or infinite loops. This is important.
Co-authored-by: van Hauser <vh@thc.org >
2023-04-27 18:00:26 +02:00
a2daef29f9
slightly different weighting algo ( #1719 )
...
* better seed selection
* slightly different weighting calculation
* remove unnecessary memset
2023-04-27 17:57:22 +02:00
e983e2e9cf
more debug
2023-04-27 16:24:43 +02:00
a25439cfa1
update readme
2023-04-27 11:50:12 +02:00
3e84d6a2ae
afl++ -> AFL++
2023-04-27 11:49:00 +02:00
7ca1b85c5e
Merge pull request #1715 from AFLplusplus/dev
...
push to stable
2023-04-26 16:33:42 +02:00
b18bc7b98f
changelog updates
2023-04-26 16:25:03 +02:00
432671449f
nits
2023-04-25 18:19:25 +02:00
96848398d4
fix
2023-04-25 17:56:36 +02:00
21865c6224
rename env to AFL_IGNORE_PROBLEMS_COVERAGE
2023-04-25 16:47:37 +02:00
b96ba509d0
Merge pull request #1714 from choller/dev
...
Add env var to ignore coverage from dynamically loaded code after forkserver
2023-04-25 16:34:23 +02:00
f94a7e8890
Add env var to ignore coverage from dynamically loaded code after forkserver.
...
When using TRACEPC instrumentation, loading code dynamically (e.g.
through dlopen()) it can be useful to completely ignore the loaded code,
esp. when it cannot be preloaded and is not the target to be tested.
This patch allows setting AFL_LLVM_IGNORE_PROBLEMS_COVERAGE=1 to do so.
2023-04-25 16:27:25 +02:00
2e23418a09
remove symlinks
2023-04-25 14:55:31 +02:00