rage against the network is a dumb protocol-unaware packet fuzzer/replayer.
Basic ideas:
* ridiculously easy to use (near-zero setup cost)
* protocol-unaware; blind brute-force fuzzing
* fairly quick (todo: proper epoll)
* comes with a collection of packets for common protocols ready to go
Current status:
+ IP only (TCP and UDP)
+ Client-side only
+ not particularly fast (single-thread blocking)
+ deterministic; fuzz-runs can be repeated given the seed of a prior run
+ target process monitoring is left as an excersize to the reader
+ naive unconfigurable mutations
Usage & download from git:
git clone https://github.com/deanjerkovich/rage_fuzzer && cd rage_fuzzer make ./rage -h
Source: https://github.com/deanjerkovich