• Home
  • Categories
  • Pricing
  • Submit
    Built with
    Ever Works
    Ever Works

    Connect with us

    Stay Updated

    Get the latest updates and exclusive content delivered to your inbox.

    Product

    • Categories
    • Pricing
    • Help

    Clients

    • Sign In
    • Register
    • Forgot password?

    Company

    • About Us
    • Admin
    • Sitemap

    Resources

    • Blog
    • Submit
    • API Documentation
    All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this repository, related repositories, and associated websites are for identification purposes only. The use of these names, logos, and brands does not imply endorsement, affiliation, or sponsorship. This directory may include content generated by artificial intelligence.
    Copyright © 2025 Ever. All rights reserved.·Terms of Service·Privacy Policy·Cookies
    Decorative pattern
    Decorative pattern
    1. Home
    2. Security
    3. Awesome Network Protocol Fuzzing

    Awesome Network Protocol Fuzzing

    A list of curated papers and tools focusing on network protocol fuzzing for discovering vulnerabilities, testing implementations, and improving protocol security.

    Surveys

    Loading more......

    Information

    Websitegithub.com
    PublishedMar 20, 2026

    Categories

    1 Item
    Security

    Tags

    3 Items
    #fuzzing#security-testing#protocols

    Similar Products

    6 result(s)

    Awesome Industrial Protocols

    Security-oriented list of resources about industrial network protocols used in SCADA, ICS, and OT environments, including protocol specifications, security tools, and research papers.

    Awesome API Security

    A collection of awesome API security tools and resources with focus on open-source tools, including OWASP API Security Project guidelines and testing frameworks.

    Awesome Networking

    A collection of awesome networking courses, books, tutorials and other resources for learning computer networking, protocols, and network programming.

    Awesome IoT

    Awesome IoT list covering frameworks, libraries, operating systems, and platforms for Internet of Things development including EdgeX Foundry, FogAtlas, and various IoT protocols.

    Awesome CloudSec Labs

    Awesome free cloud native security learning labs including CTF challenges, self-hosted workshops, guided vulnerability labs, and cloud security research environments.

    Awesome Homomorphic Encryption

    A curated list of libraries, software, papers, and resources for Homomorphic Encryption (HE), enabling computation on encrypted data without decryption for privacy-preserving applications.

    Overview

    A comprehensive list of research papers and tools focused on network protocol fuzzing. Essential resource for security researchers testing protocol implementations and discovering vulnerabilities.

    Fuzzing Fundamentals

    What is Protocol Fuzzing?

    Protocol fuzzing is a software testing technique that involves sending malformed or unexpected inputs to network protocols to discover bugs, crashes, and security vulnerabilities.

    Types of Fuzzing

    • Mutation-based - Modify existing valid inputs
    • Generation-based - Create inputs from protocol specifications
    • Grammar-based - Use protocol grammars for input generation
    • Stateful - Maintain protocol state across test cases

    Fuzzing Tools

    General Purpose

    • AFL (American Fuzzy Lop) - Coverage-guided fuzzer
    • libFuzzer - In-process, coverage-guided engine
    • Honggfuzz - Security-oriented fuzzer
    • OSS-Fuzz - Google's continuous fuzzing service

    Protocol-Specific

    • Peach - Smart protocol fuzzing framework
    • Sulley - Pure-Python fuzzing framework
    • Boofuzz - Network protocol fuzzing (fork of Sulley)
    • Defensics - Commercial comprehensive fuzzing platform

    Network Fuzzers

    • tcpreplay - Replay and edit pcap files
    • Scapy - Packet manipulation and fuzzing
    • Mutiny - Network fuzzing framework
    • SPIKE - Protocol fuzzer creation kit

    Protocol Categories

    Application Layer

    • HTTP/HTTPS fuzzing
    • DNS protocol testing
    • SMTP/IMAP email protocols
    • FTP file transfer
    • SSH secure shell

    Transport Layer

    • TCP fuzzing
    • UDP testing
    • QUIC protocol
    • SCTP

    Network Layer

    • IP protocol fuzzing
    • ICMP testing
    • IPsec

    Industrial Protocols

    • Modbus fuzzing
    • DNP3 testing
    • IEC 60870-5-104
    • OPC UA

    Research Areas

    Coverage-Guided Fuzzing

    • Code coverage metrics
    • Feedback-driven test generation
    • Corpus distillation
    • Seed selection strategies

    Stateful Fuzzing

    • Protocol state machine inference
    • State transition coverage
    • Sequence generation
    • Session handling

    Grammar-Based Fuzzing

    • Protocol specification languages
    • Automatic grammar extraction
    • Context-free grammar fuzzing
    • Validity-preserving mutations

    Vulnerability Discovery

    • Memory corruption bugs
    • Logic errors
    • Denial of service
    • Authentication bypass
    • Information disclosure

    Techniques

    Input Generation

    • Random mutation
    • Smart mutation based on protocol
    • Template-based generation
    • Learning-based approaches

    Oracle Design

    • Crash detection
    • Memory sanitizers (ASan, MSan)
    • Assertion violations
    • Behavioral anomalies
    • Resource exhaustion

    Optimization

    • Parallel fuzzing
    • Distributed fuzzing
    • Corpus minimization
    • Triage automation

    Notable Vulnerabilities

    • Heartbleed (OpenSSL)
    • FREAK attack (TLS)
    • POODLE (SSLv3)
    • Various IoT protocol bugs
    • ICS/SCADA vulnerabilities

    Best Practices

    Setup

    • Use sanitizers (ASan, UBSan, MSan)
    • Enable debug symbols
    • Configure timeouts appropriately
    • Set up crash triage automation

    Corpus Management

    • Seed with valid protocol traces
    • Minimize corpus regularly
    • Share interesting inputs
    • Archive crash-inducing inputs

    Continuous Fuzzing

    • Integrate into CI/CD
    • Long-running campaigns
    • Regular updates to fuzz targets
    • Automated bug reporting

    Evaluation Metrics

    • Code coverage achieved
    • Unique bugs discovered
    • Time to first crash
    • Executions per second
    • Memory usage

    Research Conferences

    • IEEE S&P (Oakland)
    • USENIX Security
    • ACM CCS
    • NDSS

    Pricing

    Mostly free and open-source fuzzing tools; some commercial options.