Document not found (404)
+This URL is invalid, sorry. Please use the navigation bar or search to continue.
+ +diff --git a/.nojekyll b/.nojekyll new file mode 100644 index 0000000..f173110 --- /dev/null +++ b/.nojekyll @@ -0,0 +1 @@ +This file makes sure that Github Pages doesn't process mdBook's output. diff --git a/404.html b/404.html new file mode 100644 index 0000000..7c885cb --- /dev/null +++ b/404.html @@ -0,0 +1,189 @@ + + +
+ + +This URL is invalid, sorry. Please use the navigation bar or search to continue.
+ +Configuring the fuzzer allows you to customize its behavior and optimize it for specific testing needs. This section will explain the options available for setting up the fuzzer, including general configuration options, mutator options, and sanitizers.
+To configure the fuzzer, you'll use the FuzzerConfig
builder pattern. This allows you to chain multiple configuration options and create a customized FuzzerConfig
object that controls the behavior of the fuzzing process.
Here's a basic example of how to create and apply configuration settings to the fuzzer:
++ +#![allow(unused)] +fn main() { +use fuzzer::FuzzerConfig; +use fuzzer::utils::{FuzzMode, InputFormat}; +use std::time::Duration; + +let config = FuzzerConfig::builder() + .input_format(InputFormat::JSON) + .fuzz_mode(FuzzMode::Mutation) + .timeout(Duration::from_secs(2)) + .max_iterations(5000) + .seed(12345) + .stop_on_first_crash(true) + .enable_logging(true) + .save_crashes(true) + .thread_count(4) + .build(); +}
This section will guide you through setting up and running the fuzzer for the first time. We'll cover the basic steps needed to configure the fuzzer and execute a simple fuzzing session.
+To get started with the fuzzer, you'll need to:
+FuzzerConfig
with your desired options.Fuzzer
and add your target functions.In the next section, we'll walk through a quick start example that demonstrates these steps.
+ +Welcome to the user guide for fuzzer. This guide is designed to help you understand how to install, configure, and effectively use the fuzzer to test your applications for bugs and vulnerabilities.
+The fuzzer is built with flexibility and extensibility in mind, supporting a variety of fuzzing modes, input formats, and advanced features such as coverage-guided fuzzing, corpus management, and comparison logging. Whether you're new to fuzzing or an experienced security researcher, this guide will provide you with the knowledge to utilize the fuzzer to its full potential.
+Let's begin by setting up the fuzzer and getting it running on your system.
+ +