jni-bind
JNI Bind is a set of advanced syntactic sugar for writing efficient correct JNI Code in C++17 (and up). (by google)
jazzer
Coverage-guided, in-process fuzzing for the JVM (by CodeIntelligenceTesting)
jni-bind | jazzer | |
---|---|---|
4 | 11 | |
227 | 906 | |
2.6% | - | |
8.6 | 9.2 | |
10 days ago | 2 months ago | |
C++ | Java | |
Apache License 2.0 | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
jni-bind
Posts with mentions or reviews of jni-bind.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-29.
jazzer
Posts with mentions or reviews of jazzer.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-03-18.
-
JQF Genetic Algorithm
Check out Jazzer, the code intelligence blog, and search for custom sanitizers for Java etc. https://github.com/CodeIntelligenceTesting/jazzer
-
Automated Fuzz Testing: The Power of Code Intelligence App
Input Generation: The tester uses a fuzzing tool such as CI Fuzz or Jazzer to generate random or unexpected inputs to the software application.
-
Java Fuzzing with Jazzer compared to Symflower
Fuzzing is a testing technique where random values are generated as inputs to find unexpected behavior such as crashes and security issues. Previously we looked at the new Golang release 1.18 which includes native fuzzing and our Core Technology blog series contained a post that compares symbolic execution to different other testing techniques, including fuzzing. Today, we will dive into the Java world and check out the most popular Java fuzzing solution: Jazzer.
-
jazzer.js alternatives - jazzer and cifuzz
3 projects | 12 Sep 2022
Coverage-guided fuzzer for Java
-
How to fuzz java code with jazzar?
$ git clone https://github.com/CodeIntelligenceTesting/jazzer $ cd jazzer $ ./bazelisk-linux-amd64 run //:jazzer Starting local Bazel server and connecting to it... INFO: Analyzed target //:jazzer (79 packages loaded, 1410 targets configured). INFO: Found 1 target... Target //:jazzer up-to-date: bazel-bin/jazzer INFO: Elapsed time: 43.920s, Critical Path: 7.21s INFO: 83 processes: 4 internal, 79 linux-sandbox. INFO: Build completed successfully, 83 total actions INFO: Build completed successfully, 83 total actions driver/jazzer_driver: error while loading shared libraries: libjvm.so: cannot open shared object file: No such file or directory
- How to Write Fuzz Targets with Jazzer
-
Fuzzing Java in OSS-Fuzz
One of the authors of Jazzer here. Feel free to ask any questions regarding Jazzer (https://github.com/CodeIntelligenceTesting/jazzer) or how to integrate Java/JVM projects into OSS-Fuzz.
- Jazzer: Coverage-Guided Fuzzing for JVM
- Jazzer is a coverage-guided, in-process fuzzer for the JVM platform (2021, github)
- Jazzer - a coverage-guided, in-process fuzzer for the JVM platform
What are some alternatives?
When comparing jni-bind and jazzer you can also consider the following projects:
JavaToCppAndBack - Call Java from C++ and C++ from Java with a variety of old and new projects like JNI, JNA, JNR, FFM, JExtract, GraalVM, JNI-Bind, etc.
libfuzzer-workshop - Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.