Hacker News new | past | comments | ask | show | jobs | submit login

But isn't the point of afl-fuzz that it knows deeply about the executable its targeting (watches its state)?

So it would be like inspecting the test cases deeply as you fuzz, as opposed to treating them as a black box to hill-climb...




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: