Anthropic-Cybersecurity-Skills performing-fuzzing-with-aflplusplus
'Perform coverage-guided fuzzing of compiled binaries using AFL++ (American Fuzzy Lop Plus Plus) to discover
install
source · Clone the upstream repo
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mukul975/Anthropic-Cybersecurity-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/performing-fuzzing-with-aflplusplus" ~/.claude/skills/mukul975-anthropic-cybersecurity-skills-performing-fuzzing-with-aflplusplus && rm -rf "$T"
manifest:
skills/performing-fuzzing-with-aflplusplus/SKILL.mdsource content
Performing Fuzzing with AFL++
Overview
AFL++ is a community-maintained fork of American Fuzzy Lop (AFL) that provides coverage-guided fuzzing for compiled binaries. It instruments targets at compile time or via QEMU/Unicorn mode for binary-only fuzzing, then mutates input corpora to discover new code paths. AFL++ includes advanced scheduling (MOpt, rare), custom mutators, CMPLOG for input-to-state comparison solving, and persistent mode for high-throughput fuzzing.
When to Use
- When conducting security assessments that involve performing fuzzing with aflplusplus
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing
Prerequisites
- AFL++ installed (
or build from source)apt install afl++ - Target binary source code (for compile-time instrumentation) or QEMU mode for binary-only
- Initial seed corpus of valid inputs for the target format
- Linux system with /proc/sys/kernel/core_pattern configured
Steps
- Instrument the target binary with
orafl-ccafl-clang-fast - Prepare seed corpus directory with minimal valid inputs
- Minimize corpus with
to remove redundant seedsafl-cmin - Run
with appropriate flags (-i input -o output)afl-fuzz - Monitor fuzzing progress via afl-whatsup and UI stats
- Triage crashes with
minimization and CASR/GDB analysisafl-tmin - Report unique crashes with reproduction steps
Expected Output
+++ Findings +++ unique crashes: 12 unique hangs: 3 last crash: 00:02:15 ago +++ Coverage +++ map density: 4.23% / 8.41% paths found: 1847 exec speed: 2145/sec