# afl-unicorn **Repository Path**: pwn2security/afl-unicorn ## Basic Information - **Project Name**: afl-unicorn - **Description**: No description available - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-12-26 - **Last Updated**: 2021-12-26 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ``` __ _ _ __ _ / _| | _ _ _ __ (_) ___ ___ _ __ _ __ / _` | |_| |___| | | | '_ \| |/ __/ _ \| '__| '_ \ | (_| | _| |___| |_| | | | | | (_| (_) | | | | | | \__,_|_| |_| \__,_|_| |_|_|\___\___/|_| |_| |_| ``` afl-unicorn lets you fuzz any piece of binary that can be emulated by [Unicorn Engine](http://www.unicorn-engine.org/). For an in-depth description of what this is, how to install it, and how to use it check out this [blog post](https://medium.com/@njvoss299/afl-unicorn-fuzzing-arbitrary-binary-code-563ca28936bf). For general help with AFL, please refer to both the official [AFL website](http://lcamtuf.coredump.cx/afl/) and the documents in the /doc/ directory. Created by Nathan Voss, originally funded by [Battelle](https://www.battelle.org/cyber).