van Hauser c4b1566ba3
push to stable (#1734)
* afl++ -> AFL++

* update readme

* more debug

* slightly different weighting algo (#1719)

* better seed selection

* slightly different weighting calculation

* remove unnecessary memset

* Add "Hangs saved" to afl-whatsup (#1717)

The hangs could show long or infinite loops. This is important.

Co-authored-by: van Hauser <vh@thc.org>

* nits

* afl-showmap: Start a only a single fork server (#1718)

A forkserver is started by afl_fsrv_get_mapsize() when dynamically
finding the map size.  When an input directory option is specified a
second fork server was also started.  This commit re-arranges the inits
for several forkserver struct members so that we can re-use the server
started by the get_mapsize() call when not in coresight/qemu/unicorn
modes and just start the server otherwise.

* Source Code Coverage support for Nyx (Part 1) (#1720)

* Additional source code reformatting in afl-compiler-rt

* Add source code coverage support to afl-compiler-rt (for use with Nyx)

* doc, code format

* llvm 17 changes

* more llvm 17

* add frida mode tutorial

* fix effector map

* docs

* Should memset EFF_ALEN(len) of eff_map (#1722)

* fix reallocs

* fix afl-system-config for macos

* afl-fuzz.c: Document -i - in --help (#1725)

afl-fuzz.c: Document `-i -` in `--help`, to write that `-i` can be passed '-' to resume the prior fuzzing job. Also reference AFL_AUTORESUME so users know they can set that parameter to sidestep the issue entirely.

* tritondse custom mutator attempt

* tritondse fixes

* update libnyx (#1727)

* GNUmakefile: Update LLVM instructions (#1728)

Update LLVM instructions, because versions higher than 14 are supported and to be explicit that LLD is also required

* disable macos in the ci, works fine for me

* fix makefile

* better tritondse support

* next steps for tritondse

* qemuafl: Persistent mode for PPC32 targets

* update qemu_mode

* afl-clang-lto incomptable with -flto=thin

* add @responsefile support for afl-cc

---------

Co-authored-by: fxlb <devel.fx.lebail@orange.fr>
Co-authored-by: Nick Potenski <nick.potenski@garmin.com>
Co-authored-by: Christian Holler (:decoder) <choller@mozilla.com>
Co-authored-by: lazymio <mio@lazym.io>
Co-authored-by: Moshe Kaplan <me@moshekaplan.com>
Co-authored-by: Sergej Schumilo <sergej@schumilo.de>
Co-authored-by: Dominik Maier <domenukk@gmail.com>
2023-05-15 10:51:37 +02:00
..
2023-05-15 10:51:37 +02:00
2023-05-15 10:51:37 +02:00
2023-05-15 10:51:37 +02:00
2023-05-15 10:51:37 +02:00
2023-03-06 09:15:05 +01:00
2023-02-28 11:03:09 +01:00
2023-05-15 10:51:37 +02:00
2021-12-13 18:03:02 +01:00
2023-04-15 12:28:39 +02:00
2023-05-15 10:51:37 +02:00

AFL++ documentation

This is the overview of the AFL++ docs content.

For general information on AFL++, see the README.md of the repository.

Also take a look at our FAQ.md and best_practices.md.

Fuzzing targets with the source code available

You can find a quickstart for fuzzing targets with the source code available in the README.md of the repository.

For in-depth information on the steps of the fuzzing process, see fuzzing_in_depth.md or click on the following image and select a step.

Fuzzing process overview

For further information on instrumentation, see the READMEs in the instrumentation/ folder.

Instrumenting the target

For more information, click on the following image and select a step.

Instrumenting the target

Preparing the fuzzing campaign

For more information, click on the following image and select a step.

Preparing the fuzzing campaign

Fuzzing the target

For more information, click on the following image and select a step.

Fuzzing the target

Managing the fuzzing campaign

For more information, click on the following image and select a step.

Managing the fuzzing campaign

Fuzzing other targets

To learn about fuzzing other targets, see:

Additional information