blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-of-Materials (SBOM) for supported binaries.
☆434Feb 5, 2026Updated last month
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below
Sorting:
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,211Jan 23, 2026Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆94Feb 26, 2026Updated last week
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- A universal SBOM representation in protocol buffers☆319Updated this week
- ☆75Mar 19, 2025Updated 11 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆85Feb 4, 2026Updated last month
- The open source AI platform for secure enterprise agents.☆3,518Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆515Jun 20, 2025Updated 8 months ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Add a layer of active defense to your cloud applications.☆104Updated this week
- secator - the pentester's swiss knife☆1,244Updated this week
- ☆52Dec 13, 2025Updated 2 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Deep Linux runtime visibility meets Wireshark☆304Nov 13, 2025Updated 3 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- Code Hierarchy Exploration Net (chen)☆27Feb 14, 2026Updated 3 weeks ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Dec 2, 2025Updated 3 months ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆138Updated this week
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆692Jan 6, 2026Updated 2 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Feb 25, 2026Updated last week
- SSHamble: Unexpected Exposures in SSH☆1,175Feb 16, 2026Updated 2 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated 3 weeks ago
- #supply #chain #attack #detection☆646Updated this week
- The useful exploit finder☆828Jan 19, 2026Updated last month
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆235Jul 8, 2025Updated 7 months ago
- Gram is Klarna's own threat model diagramming tool☆331Jan 26, 2026Updated last month
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆757Feb 1, 2026Updated last month
- Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package manager…☆912Updated this week
- Open Adversarial Exposure Validation Platform☆1,634Updated this week
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 2 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- Threat-hunting tool for Linux☆1,046Feb 16, 2026Updated 2 weeks ago
- Tools for interacting with authentication packages using their individual message protocols☆409Mar 1, 2026Updated last week