syzkaller VS vuls

Compare syzkaller vs vuls and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
syzkaller vuls
7 3
5,124 10,659
1.5% 0.7%
0.0 8.8
about 21 hours ago 8 days ago
Go Go
Apache License 2.0 GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

syzkaller

Posts with mentions or reviews of syzkaller. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-17.
  • Automated Unit Test Improvement Using Large Language Models at Meta
    6 projects | news.ycombinator.com | 17 Feb 2024
    https://arxiv.org/abs/2402.09171 :

    > This paper describes Meta's TestGen-LLM tool, which uses LLMs to automatically improve existing human-written tests. TestGen-LLM verifies that its generated test classes successfully clear a set of filters that assure measurable improvement over the original test suite, thereby eliminating problems due to LLM hallucination. [...] We believe this is the first report on industrial scale deployment of LLM-generated code backed by such assurances of code improvement.

    Coverage-guided unit test improvement might [with LLMs] be efficient too.

    https://github.com/topics/coverage-guided-fuzzing :

    - e.g. Google/syzkaller is a coverage-guided syscall fuzzer: https://github.com/google/syzkaller

    - Gitlab CI supports coverage-guided fuzzing: https://docs.gitlab.com/ee/user/application_security/coverag...

    - oss-fuzz, osv

    Additional ways to improve tests:

    Hypothesis and pynguin generate tests from type annotations.

    There are various tools to generate type annotations for Python code;

    > pytype (Google) [1], PyAnnotate (Dropbox) [2], and MonkeyType (Instagram) [3] all do dynamic / runtime PEP-484 type annotation type inference [4] to generate type annotations. https://news.ycombinator.com/item?id=39139198

    icontract-hypothesis generates tests from icontract DbC Design by Contract type, value, and invariance constraints specified as precondition and postcondition @decorators:

  • Differ: Tool for testing and validating transformed programs
    6 projects | news.ycombinator.com | 31 Jan 2024
    https://google.github.io/clusterfuzz/setting-up-fuzzing/libf...

    > OSS-Fuzz runs CloudFuzz[Lite?] for many open source repos and feeds OSV OpenSSF Vulnerability Format: https://github.com/google/osv#current-data-sources

    .

    Google/syzkaller https://github.com/google/syzkaller :

    >> syzkaller is an unsupervised coverage-guided kernel fuzzer. Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows

    .

    ghidra-patchdiff-correlator:

  • Fuzz Testing Is the Best Thing to Happen to Our Application Tests
    3 projects | news.ycombinator.com | 17 Aug 2023
    The key to modern fuzzing is feedback, usually some kind of coverage testing of the program under test. This allows the fuzzer to be much smarter about how it finds new code paths, and makes fuzzing find bugs a lot quicker.

    Google have a project to do fuzzing on Linux system calls using coverage feedback: https://github.com/google/syzkaller

  • Is there a Linux user-space program that causes execution through every kernel function path and context?
    1 project | /r/kernel | 5 Jun 2023
    Utilities that try to exercise ("fuzz") an interface with the intent of discovering bugs are called "fuzzers". The tool that comes to mind is syzkaller.
  • Those scary warnings of juice jacking in airports and hotels? They’re nonsense
    1 project | /r/technology | 1 May 2023
    It's true that USB is probably a less desirable attack surface than modems, because it actually requires the user to physically connect their device to a malicious device, but I wouldn't discount it as impractical and unlikely to happen in the wild. There's a reason some of the more famous malware and spyware used to spread/attack over USB. Google actually does USB driver fuzzing and the amount of potentially devastating vulnerabilities is staggering.
  • Linux System Call Table – Chromiumos
    1 project | news.ycombinator.com | 30 Oct 2022
  • Audit of Linux kernel code
    2 projects | /r/linuxquestions | 14 Dec 2021

vuls

Posts with mentions or reviews of vuls. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-08-23.

What are some alternatives?

When comparing syzkaller and vuls you can also consider the following projects:

AFLplusplus - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

wtf - wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mode (experimental!).

aeacus - 🔐 Vulnerability remediation scoring system

ipa-medit - Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.

nvdtools - A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)

gvisor - Application Kernel for Containers

clair-scanner - Docker containers vulnerability scan

xpid - Linux Process Discovery. C Library, Go bindings, Runtime.

jaeles - The Swiss Army knife for automated Web Application Testing

cfuzzer - url-fuzzer

rapidscan - :new: The Multi-Tool Web Vulnerability Scanner.