owasp-dep-scan / blint
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
☆355Updated last month
Alternatives and similar repositories for blint:
Users that are interested in blint are comparing it to the libraries listed below
- Deep Linux runtime visibility meets Wireshark☆257Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆81Updated last month
- A repo to conduct vulnerability enrichment.☆538Updated this week
- #supply #chain #attack #detection☆495Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆186Updated this week
- 💀 Don't fear the Reaper 👻☆449Updated last week
- ☆254Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆232Updated this week
- boostsecurityio/poutine☆244Updated 3 weeks ago
- Validate the isolation posture of your container environment.☆235Updated last week
- ☆70Updated 11 months ago
- Add a layer of active defense to your cloud applications.☆88Updated last week
- Threat-hunting tool for Linux☆433Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆154Updated 10 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆557Updated last week
- Galah: An LLM-powered web honeypot.☆461Updated 3 months ago
- Gram is Klarna's own threat model diagramming tool☆317Updated this week
- CI/CD Security Analyzer☆643Updated 3 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆369Updated 3 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆284Updated this week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆386Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆198Updated last year
- ☆293Updated 5 months ago
- Pen Test Report Generation and Assessment Collaboration☆460Updated 2 weeks ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆154Updated 2 years ago
- A universal SBOM representation in protocol buffers☆275Updated this week
- DFIQ is a collection of investigative questions and the approaches for answering them☆267Updated 2 weeks ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 3 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆71Updated 10 months ago