blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-of-Materials (SBOM) for supported binaries.
☆448May 6, 2026Updated last week
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,230May 8, 2026Updated last week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆90Mar 17, 2026Updated last month
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆96Mar 10, 2026Updated 2 months ago
- A universal SBOM representation in protocol buffers☆323Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆140May 8, 2026Updated last week
- Open-source security automation platform for teams and AI agents☆3,598Updated this week
- Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package manager…☆961Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆514Jun 20, 2025Updated 10 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- secator - the pentester's swiss knife☆1,279May 8, 2026Updated last week
- Code Hierarchy Exploration Net (chen)☆28Mar 9, 2026Updated 2 months ago
- ☆57Dec 13, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆75Mar 19, 2025Updated last year
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 3 months ago
- #supply #chain #attack #detection☆654Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,489May 4, 2026Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆700Jan 6, 2026Updated 4 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 11 months ago
- Gram is Klarna's own threat model diagramming tool☆334May 8, 2026Updated last week
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆61May 20, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- SSHamble: Unexpected Exposures in SSH☆1,179May 3, 2026Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 5 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆106May 8, 2026Updated last week
- Threat-hunting tool for Linux☆1,059May 5, 2026Updated last week
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- A rewrite of YARA in Rust.☆1,132May 8, 2026Updated last week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,083Updated this week
- Tools for interacting with authentication packages using their individual message protocols☆436May 1, 2026Updated 2 weeks ago
- The useful exploit finder☆824Jan 19, 2026Updated 3 months ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆75Apr 18, 2024Updated 2 years ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆161May 8, 2026Updated last week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆110Feb 16, 2024Updated 2 years ago