Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Our platform uses a variety of security techniques, including feedback-based fuzz testing and coverage-guided fuzz testing, in order to generate millions upon millions of test cases that trigger difficult-to-find bugs deep in your application. This white-box approach helps to prevent edge cases and speed up development. Advanced fuzzing engines produce inputs that maximize code coverage. Powerful bug detectors check for errors during code execution. Only uncover true vulnerabilities. You will need the stack trace and input to prove that you can reproduce errors reliably every time. AI white-box testing is based on data from all previous tests and can continuously learn the inner workings of your application. This allows you to trigger security-critical bugs with increasing precision.

Description

Go-fuzz serves as a coverage-guided fuzzing tool designed specifically for testing Go packages, making it particularly effective for those that handle intricate inputs, whether they are textual or binary in nature. This method of testing is crucial for strengthening systems that need to process data from potentially harmful sources, such as network interactions. Recently, go-fuzz has introduced initial support for fuzzing Go Modules, inviting users to report any issues they encounter with detailed descriptions. It generates random input data, which is often invalid, and the function must return a value of 1 to indicate that the fuzzer should elevate the priority of that input in future fuzzing attempts, provided that it should not be stored in the corpus, even if it uncovers new coverage; a return value of 0 signifies the opposite, while other values are reserved for future enhancements. The fuzz function is required to reside in a package that go-fuzz can recognize, meaning the code under test cannot be located within the main package, although fuzzing of internal packages is permitted. This structured approach ensures that the testing process remains efficient and focused on identifying vulnerabilities in the code.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Apache Maven
C
C++
CLion
CircleCI
Docker
GitHub
GitLab
Go
Gradle
JUnit
Java
JavaScript
Jenkins
Jira
Kubernetes
Travis CI
Vim
Visual Basic
Visual Studio

Integrations

Apache Maven
C
C++
CLion
CircleCI
Docker
GitHub
GitLab
Go
Gradle
JUnit
Java
JavaScript
Jenkins
Jira
Kubernetes
Travis CI
Vim
Visual Basic
Visual Studio

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Code Intelligence

Country

Germany

Website

www.code-intelligence.com

Vendor Details

Company Name

dvyukov

Website

github.com/dvyukov/go-fuzz

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Product Features

Alternatives

go-fuzz Reviews

go-fuzz

dvyukov

Alternatives

Honggfuzz Reviews

Honggfuzz

Google
Mayhem Reviews

Mayhem

ForAllSecure
LibFuzzer Reviews

LibFuzzer

LLVM Project
LibFuzzer Reviews

LibFuzzer

LLVM Project
Atheris Reviews

Atheris

Google
CI Fuzz Reviews

CI Fuzz

Code Intelligence