Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Identify performance limitations or other hidden issues that conventional software testing may overlook. Establish clear criteria for halting an experiment or reverting to the original state prior to experimentation. Execute experiments within minutes by utilizing pre-defined scenarios available in the FIS scenario library. Gain enhanced understanding by simulating real-world failure scenarios, such as the degradation of various resources' performance. Integrated within AWS Resilience Hub, the AWS Fault Injection Service (FIS) is a fully managed solution designed for conducting fault injection experiments aimed at enhancing an application’s performance, visibility, and resilience. FIS streamlines the setup and execution of controlled fault injection tests across multiple AWS services, enabling teams to gain confidence in how their applications respond. Additionally, FIS equips teams with essential controls and safeguards for conducting experiments in production, including automatic rollback or cessation of the experiment upon meeting predetermined conditions, thus ensuring a safer testing environment. With these capabilities, teams can effectively identify vulnerabilities and improve their overall application resilience.

Description

FuzzDB was developed to enhance the chances of identifying security vulnerabilities in applications through dynamic testing methods. As the first and most extensive open repository of fault injection patterns, along with predictable resource locations and regex for server response matching, it serves as an invaluable resource. This comprehensive database includes detailed lists of attack payload primitives aimed at fault injection testing. The patterns are organized by type of attack and, where applicable, by the platform, and they are known to lead to vulnerabilities such as OS command injection, directory listings, directory traversals, source code exposure, file upload bypass, authentication bypass, cross-site scripting (XSS), HTTP header CRLF injections, SQL injection, NoSQL injection, and several others. For instance, FuzzDB identifies 56 patterns that might be interpreted as a null byte, in addition to offering lists of frequently used methods and name-value pairs that can activate debugging modes. Furthermore, the resource continuously evolves as it incorporates new findings and community contributions to stay relevant against emerging threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Resilience Hub
Amazon Web Services (AWS)
BlackArch Linux
NoSQL
OWASP ZAP

Integrations

AWS Resilience Hub
Amazon Web Services (AWS)
BlackArch Linux
NoSQL
OWASP ZAP

Pricing Details

$0.10 per action-minute
Free Trial
Free Version

Pricing Details

Free
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Amazon

Country

United States

Website

aws.amazon.com/fis/

Vendor Details

Company Name

FuzzDB

Website

github.com/fuzzdb-project/fuzzdb

Product Features

Product Features

Alternatives

Alternatives

API Fuzzer Reviews

API Fuzzer

Fuzzapi
CI Fuzz Reviews

CI Fuzz

Code Intelligence