Skip to main content

A professional-grade DICOM fuzzing tool for healthcare security testing

Project description

DICOM Fuzzer

Security testing framework for DICOM medical imaging systems. Identifies vulnerabilities in PACS servers, medical imaging viewers, and DICOM parsers through automated fuzzing.

CI codecov Python 3.11+ License: MIT

Installation

git clone https://github.com/Dashtid/DICOM-Fuzzer.git
cd DICOM-Fuzzer
uv sync
source .venv/bin/activate  # or .venv\Scripts\activate on Windows

Quick Start

# Basic fuzzing
dicom-fuzzer input.dcm -c 100 -o ./artifacts/output

# With target application testing
dicom-fuzzer input.dcm -c 1000 -t ./viewer.exe --timeout 10

# Generate HTML report
dicom-fuzzer report ./artifacts/output --format html

Features

Fuzzing

  • Mutation-based and grammar-aware DICOM fuzzing
  • Coverage-guided fuzzing with corpus management
  • 3D series fuzzing (CT/MRI volumetric data)
  • Network protocol fuzzing (DIMSE, TLS)

Analysis

  • Automatic crash detection and deduplication
  • Crash triaging with severity/exploitability scoring
  • Test case minimization (delta debugging)
  • Stability tracking for non-deterministic behavior

Integration

  • CLI with 10+ subcommands
  • Python API for custom workflows
  • Docker targets (DCMTK, Orthanc)
  • CI/CD pipeline ready

CLI Reference

dicom-fuzzer --help              # Main help
dicom-fuzzer fuzz --help         # Fuzzing options
dicom-fuzzer report --help       # Report generation
dicom-fuzzer corpus --help       # Corpus management
dicom-fuzzer tls --help          # TLS/auth testing
dicom-fuzzer differential --help # Cross-parser testing

See docs/CLI_REFERENCE.md for full command documentation.

Python API

from dicom_fuzzer.core.mutator import DicomMutator
from dicom_fuzzer.core.fuzzing_session import FuzzingSession
import pydicom

session = FuzzingSession(output_dir="./artifacts/output")
mutator = DicomMutator()
dataset = pydicom.dcmread("input.dcm")

for i in range(100):
    fuzzed = mutator.mutate(dataset)
    fuzzed.save_as(f"artifacts/output/fuzz_{i:04d}.dcm")

session.save_report()

Project Structure

dicom-fuzzer/
├── dicom_fuzzer/    # Main package
├── tests/           # Test suite (2000+ tests)
├── tools/           # Scripts, examples, generators
├── configs/         # Docker, targets, seeds
├── docs/            # Documentation
└── artifacts/       # Runtime output (gitignored)

Documentation

Security

This tool is for authorized security testing only. See SECURITY.md.

License

MIT - see LICENSE

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dicom_fuzzer-1.7.1.tar.gz (1.2 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dicom_fuzzer-1.7.1-py3-none-any.whl (503.9 kB view details)

Uploaded Python 3

File details

Details for the file dicom_fuzzer-1.7.1.tar.gz.

File metadata

  • Download URL: dicom_fuzzer-1.7.1.tar.gz
  • Upload date:
  • Size: 1.2 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for dicom_fuzzer-1.7.1.tar.gz
Algorithm Hash digest
SHA256 1720ae56b30f65b7dbcc74847ab730db37d1e01cfcfeb1c922c805dc7505509d
MD5 1140894d9d88fe9bdd39c528de95b029
BLAKE2b-256 50912015608f43e84f52dfccab2d55bc031653c1d9046fc86968e516fc2bf906

See more details on using hashes here.

File details

Details for the file dicom_fuzzer-1.7.1-py3-none-any.whl.

File metadata

  • Download URL: dicom_fuzzer-1.7.1-py3-none-any.whl
  • Upload date:
  • Size: 503.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for dicom_fuzzer-1.7.1-py3-none-any.whl
Algorithm Hash digest
SHA256 2a34bd4bac07da11c932d15179f2919b64f3f65ff01db428e157d9263aa4ffcc
MD5 6fe467310e390859fc8269f31aaef29f
BLAKE2b-256 fa43358f1f70b975bf5ac8c915cf84f607b39634c45e579d65a15816f427b9df

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page