Coverage-guided protocol fuzzer for security testing
Project description
ProtoCrash
Coverage-Guided Protocol Fuzzer for Vulnerability Discovery
ProtoCrash is a smart mutation-based fuzzer designed to find crashes and vulnerabilities in network protocol implementations. Built with intelligent feedback-driven fuzzing techniques, it targets custom protocols, binary formats, and network services.
Features
- Coverage-Guided Fuzzing - AFL-style instrumentation for intelligent test case generation
- Distributed Fuzzing - Multi-process parallelization for maximum throughput
- Multi-Protocol Support - HTTP, DNS, SMTP, custom binary protocols
- Smart Mutation Engine - Context-aware mutations based on protocol structure
- Crash Detection - Automatic crash analysis, classification, and exploitability assessment
- Real-Time Dashboard - Live fuzzing statistics with keyboard controls
- Report Generation - Text, JSON, and HTML reports with visualizations
- Minimal Dependencies - Pure Python implementation
- Extensible - Easy to add custom protocol parsers and mutation strategies
Installation
pip install protocrash
Or install from source:
git clone https://github.com/noobforanonymous/ProtoCrash.git
cd ProtoCrash
pip install -e .
CLI Usage
Fuzzing Commands
# Basic fuzzing with real-time dashboard
protocrash fuzz --target ./vulnerable_app --corpus ./seeds --crashes ./crashes
# Distributed fuzzing with 8 workers
protocrash fuzz --target ./vulnerable_app --workers 8 --duration 3600
# Protocol-specific fuzzing
protocrash fuzz --target tcp://localhost:8080 --protocol http --timeout 5000
Crash Analysis
# Analyze crashes with exploitability assessment
protocrash analyze --crash-dir ./crashes
# Classify and deduplicate crashes
protocrash analyze --crash-dir ./crashes --dedupe --classify
# Filter by crash type
protocrash analyze --crash-dir ./crashes --type segv
Report Generation
# Generate text report
protocrash report --campaign-dir ./campaign --format text
# Generate HTML report with charts
protocrash report --campaign-dir ./campaign --format html --output report.html
# Generate JSON report for automation
protocrash report --campaign-dir ./campaign --format json --output report.json
Dashboard Controls
When running the real-time dashboard:
p- Pause/resume fuzzingr- Refresh displayq- Quit gracefully
Distributed Fuzzing
ProtoCrash supports multi-process distributed fuzzing for increased throughput.
Python API
from protocrash.distributed import DistributedCoordinator
from protocrash.fuzzing_engine.coordinator import FuzzingConfig
config = FuzzingConfig(
target_cmd=["./target", "@@"],
corpus_dir="./corpus",
crashes_dir="./crashes",
timeout_ms=5000
)
# Launch distributed fuzzing with 8 workers
coordinator = DistributedCoordinator(config, num_workers=8)
coordinator.run(duration=3600) # Run for 1 hour
Architecture
- Master-Worker Model: One coordinator process manages N worker processes
- Corpus Synchronization: Workers share interesting test cases via filesystem
- Statistics Aggregation: Real-time performance metrics from all workers
- Crash Deduplication: Unique crash detection across all workers
Performance
Distributed fuzzing scales efficiently:
- 1 worker: ~50,000 exec/sec
- 4 workers: ~180,000 exec/sec
- 8 workers: ~350,000 exec/sec
- Scaling efficiency: ~87.5%
Project Status
| Metric | Value |
|---|---|
| Tests | 859 passing (100%) |
| Coverage | 96% |
| Production Code | 9,093 lines |
| Test Code | 12,661 lines |
| Platforms | Linux (full), Windows (partial) |
Documentation
- Usage Guide
- Setup Instructions
- System Architecture
- Fuzzing Engine Details
- Distributed Fuzzing Guide
- CLI & Reporting
How It Works
Input Corpus → Smart Mutation → Target Execution → Coverage Feedback → Crash Detection
↑ ↓
└──────────────── New Interesting Cases ──────────────┘
ProtoCrash uses coverage-guided fuzzing to intelligently generate test cases that explore new code paths in the target application. It monitors the target for crashes, hangs, and memory corruption, automatically saving reproducible test cases.
Requirements
- Python 3.11+
- Linux (recommended for best coverage support)
- Target application for fuzzing
Ethical Use
ProtoCrash is designed exclusively for authorized security testing, vulnerability research, and software quality assurance. Only use this tool on systems you own or have explicit permission to test.
See Ethical Guidelines for detailed usage policy.
Author
Regaan
- GitHub: @noobforanonymous
License
MIT License - see LICENSE file for details
Acknowledgments
Built with inspiration from AFL, LibFuzzer, and Boofuzz. Designed for the security research community.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file protocrash-1.0.0.tar.gz.
File metadata
- Download URL: protocrash-1.0.0.tar.gz
- Upload date:
- Size: 86.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a004f07562be9ff11740cdec578ddfcc69e4983918da84d288ecb519ef91678b
|
|
| MD5 |
bcaab016bdfc79686e1da18e313181a9
|
|
| BLAKE2b-256 |
1651ce94c1895078f1b4632476bc916e82302f888a65ec4dd522b5e3b402da02
|
Provenance
The following attestation bundles were made for protocrash-1.0.0.tar.gz:
Publisher:
publish.yml on noobforanonymous/ProtoCrash
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
protocrash-1.0.0.tar.gz -
Subject digest:
a004f07562be9ff11740cdec578ddfcc69e4983918da84d288ecb519ef91678b - Sigstore transparency entry: 782134542
- Sigstore integration time:
-
Permalink:
noobforanonymous/ProtoCrash@2eb50faa244f66a28e547815e2601820d41d4fa7 -
Branch / Tag:
refs/tags/v1.0.0 - Owner: https://github.com/noobforanonymous
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@2eb50faa244f66a28e547815e2601820d41d4fa7 -
Trigger Event:
release
-
Statement type:
File details
Details for the file protocrash-1.0.0-py3-none-any.whl.
File metadata
- Download URL: protocrash-1.0.0-py3-none-any.whl
- Upload date:
- Size: 94.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5a2fa872d35fb8e0315dbdc288b8e8daecef3991255c5d217dcdc18cd4dc7186
|
|
| MD5 |
27158947b8f7f7e789ea670b3a14b80b
|
|
| BLAKE2b-256 |
d224e3dd14cf242fcde61a54151bce83ed7a27e3012ab2ee12341a40763f9938
|
Provenance
The following attestation bundles were made for protocrash-1.0.0-py3-none-any.whl:
Publisher:
publish.yml on noobforanonymous/ProtoCrash
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
protocrash-1.0.0-py3-none-any.whl -
Subject digest:
5a2fa872d35fb8e0315dbdc288b8e8daecef3991255c5d217dcdc18cd4dc7186 - Sigstore transparency entry: 782134543
- Sigstore integration time:
-
Permalink:
noobforanonymous/ProtoCrash@2eb50faa244f66a28e547815e2601820d41d4fa7 -
Branch / Tag:
refs/tags/v1.0.0 - Owner: https://github.com/noobforanonymous
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@2eb50faa244f66a28e547815e2601820d41d4fa7 -
Trigger Event:
release
-
Statement type: