Useful Links
Computer Science
Cybersecurity
Fuzzing
1. Introduction to Fuzzing
2. Core Concepts and Architecture
3. Types of Fuzzers
4. Input Generation and Mutation Strategies
5. Target Monitoring and Instrumentation
6. The Fuzzing Process
7. Crash Triage and Analysis
8. Advanced Fuzzing Techniques
9. Fuzzing in the Software Development Lifecycle
10. Common Vulnerabilities Discovered by Fuzzing
11. Common Fuzzing Tools and Frameworks
12. Fuzzing Best Practices
13. Challenges and Limitations
14. Future Directions and Research
Input Generation and Mutation Strategies
Mutation-Based Techniques
Simple Mutations
Bit Flipping
Single Bit Changes
Bit Patterns
Byte Flipping
Single Byte Changes
Multi-Byte Flips
Random Byte Insertion
Inserting Random Data
Input Length Variation
Random Byte Deletion
Removing Data Segments
Truncation Effects
Block-Based Mutations
Splicing
Combining Input Segments
Randomized Splicing
Splicing Test Cases
Merging Multiple Inputs
Preserving Structure
Dictionary-Based Mutations
Using Magic Numbers and Keywords
Protocol-Specific Values
Application-Specific Tokens
Custom Dictionaries
Domain-Specific Terms
Common Patterns
Arithmetic Mutations
Integer Manipulation
Boundary Value Testing
Generation-Based Techniques
Grammar Definition
Context-Free Grammars
Protocol Specifications
Grammar-Aware Input Generation
Generating Valid Inputs
Fuzzing Complex Parsers
Template-Based Generation
Input Templates
Parameterized Generation
Evolutionary Algorithms
Genetic Algorithms
Fitness Functions
Selection Strategies
Mutation Scheduling
Adaptive Mutation Rates
Strategy Selection
Previous
3. Types of Fuzzers
Go to top
Next
5. Target Monitoring and Instrumentation