10 releases

0.14.5 Nov 13, 2023
0.14.4 Nov 10, 2023
0.14.3 Oct 9, 2023
0.14.1 Aug 29, 2023
0.0.0 Mar 27, 2023

#13 in Cargo plugins

Download history 24/week @ 2023-08-14 45/week @ 2023-08-21 472/week @ 2023-08-28 246/week @ 2023-09-04 413/week @ 2023-09-11 254/week @ 2023-09-18 349/week @ 2023-09-25 885/week @ 2023-10-02 1086/week @ 2023-10-09 768/week @ 2023-10-16 881/week @ 2023-10-23 465/week @ 2023-10-30 397/week @ 2023-11-06 794/week @ 2023-11-13 458/week @ 2023-11-20 812/week @ 2023-11-27

2,531 downloads per month


119K SLoC

C 95K SLoC // 0.1% comments C++ 15K SLoC // 0.1% comments Python 3.5K SLoC // 0.2% comments Shell 3K SLoC // 0.1% comments Rust 747 SLoC // 0.1% comments JavaScript 552 SLoC // 0.2% comments BASH 339 SLoC // 0.2% comments TypeScript 328 SLoC // 0.4% comments CodeQL 45 SLoC // 0.1% comments Java 43 SLoC // 0.4% comments SQL 3 SLoC

Contains (ELF exe/lib, 21KB) persistent_target, (ELF exe/lib, 17KB) persistent_target_x86_64, (ELF exe/lib, 18KB) simple_target_x86_64, (ELF exe/lib, 17KB) persistent_target_x86_64, (ELF exe/lib, 18KB) simple_target_x86_64, (ELF exe/lib, 1KB) small_exec.elf and 1 more.

afl.rs logo

Fuzzing Rust code with AFLplusplus

Notice: Version 0.14.0 of afl.rs requires you to install the cargo-afl binary with:

cargo install cargo-afl

If the binary is already installed, you may need to add --force.

What is it?

Fuzz testing is a software testing technique used to find security and stability issues by providing pseudo-random data as input to the software. AFLplusplus is a popular, effective, and modern fuzz testing tool based on AFL. This library, afl.rs, allows one to run AFLplusplus on code written in the Rust programming language.


Documentation can be found in the Rust Fuzz Book.

What does it look like?

Screen recording of afl

Screen recording of AFL running on Rust code.


Before starting to fuzz, you should reconfigure your system for optimal performance and better crash detection. This can be done with cargo-afl afl system-config. But this subcommand requires root, so it uses sudo internally. Hence, you might need to enter your password.

By default, the AFL++ CMPLOG feature is activated, which helps to achieve good code coverage. However, it is not beneficial to activate CMPLOG on more than two instances. So if you run multiple AFL++ instances on your fuzzing target, you can disable CMPLOG by specifying the command line parameter '-c -'.

This document will familiarize you with AFL++ features to help in running a successful fuzzing campaign.

By default, the fuzzing config is set when cargo-afl is used to build. If you want to prevent this, just set the environment variable AFL_NO_CFG_FUZZING to 1 when building.