You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: 02-Use_the_Tools_Available.md
+10
Original file line number
Diff line number
Diff line change
@@ -315,6 +315,12 @@ Both of these tools use coverage reporting to find new code execution paths and
315
315
*[LibFuzzer](http://llvm.org/docs/LibFuzzer.html)
316
316
*[KLEE](http://klee.github.io/) - Can be used to fuzz individual functions
317
317
318
+
#### Continuous Fuzzing
319
+
320
+
Continuous fuzzing tools exist to run fuzz tests for you with each commit.
321
+
322
+
*[Fuzzit](https://fuzzit.dev/)
323
+
318
324
### Mutation Testers
319
325
320
326
These tools take code executed during unit test runs and mutate the executed code. If the test continues to pass with a mutation in place, then there is likely a flawed test in your suite.
@@ -403,3 +409,7 @@ Don't forget to make sure that your error handling is being tested and works pro
403
409
### pahole
404
410
405
411
[pahole](https://linux.die.net/man/1/pahole) generates data on holes in the packing of data structures and classes in compiled code. It can also the size of structures and how they fit within the system's cache lines.
412
+
413
+
### BinSkim
414
+
415
+
[BinSkim](https://github.com/Microsoft/binskim) is a binary static analysis tool that provides security and correctness results for Windows Portable Executable and *nix ELF binary formats
0 commit comments