Become a sponsor to Advanced Fuzzing League ++
We are a team of open source enthusiasts that develop a best-of-line fuzzing tools to improve software security and therefore make the Internet a safer place.
AFLplusplus is integrated in Google's oss-fuzz and clusterfuzz, and is also used by the Github Security Team and many other corporation and open source projects
We seek donations to better support platforms other than x64 Linux (e.g. MacOS, Windows, RiscV, etc).
Meet the team
-
van Hauser vanhauser-thcSecurity researcher since 1994 https://www.mh-sec.de/ https://www.thc.org/
-
Andrea Fioraldi andreafioraldiWriting fuzzers to find assertion errors and null ptr derefs. Trying to do a Kamehameha since I was 4.
Featured work
-
AFLplusplus/AFLplusplus
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
C 5,186 -
AFLplusplus/LibAFL
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...
Rust 2,025 -
AFLplusplus/qemuafl
This fork of QEMU enables fuzzing userspace ELF binaries under AFL++.
C 79 -
AFLplusplus/unicornafl
AFL bindings for Unicorn-Engine
Rust 67 -
AFLplusplus/cargo-libafl
Fuzz Rust code with LibAFL
Rust 57 -
AFLplusplus/qemu-libafl-bridge
A patched QEMU that exposes an interface for LibAFL-based fuzzers
C 59
$250 one time
SelectGet a one hour face time video call with one of the AFL++ team members (we choose whom based on availability and required knowledge) to either help you using AFL++/libafl/... or how to expand it ... or just drink a beer with and get to know us :-)