blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-of-Materials (SBOM) for supported binaries.
☆441Apr 13, 2026Updated this week
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,226Mar 9, 2026Updated last month
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆87Mar 17, 2026Updated last month
- Automation tool for Windows Deception Host Burn-In☆85Dec 4, 2024Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆94Mar 10, 2026Updated last month
- A universal SBOM representation in protocol buffers☆322Apr 6, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆139Mar 10, 2026Updated last month
- Open-source security automation platform for teams and AI agents☆3,551Updated this week
- Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package manager…☆945Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆514Jun 20, 2025Updated 10 months ago
- Code Hierarchy Exploration Net (chen)☆27Mar 9, 2026Updated last month
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- secator - the pentester's swiss knife☆1,265Updated this week
- ☆56Dec 13, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆75Mar 19, 2025Updated last year
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- #supply #chain #attack #detection☆649Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,424Updated this week
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 11 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆700Jan 6, 2026Updated 3 months ago
- Gram is Klarna's own threat model diagramming tool☆333Updated this week
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆60May 20, 2025Updated 10 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- SSHamble: Unexpected Exposures in SSH☆1,183Feb 16, 2026Updated 2 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆106Updated this week
- Threat-hunting tool for Linux☆1,053Updated this week
- A rewrite of YARA in Rust.☆1,092Updated this week
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,058Updated this week
- Tools for interacting with authentication packages using their individual message protocols☆433Apr 1, 2026Updated 2 weeks ago
- The useful exploit finder☆826Jan 19, 2026Updated 3 months ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆75Apr 18, 2024Updated 2 years ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆161Updated this week
- Open Adversarial Exposure Validation Platform☆1,658Apr 12, 2026Updated last week