owasp-dep-scan / blint
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
☆355Updated last month
Alternatives and similar repositories for blint:
Users that are interested in blint are comparing it to the libraries listed below
- Deep Linux runtime visibility meets Wireshark☆259Updated last week
- Pen Test Report Generation and Assessment Collaboration☆462Updated last month
- 💀 Don't fear the Reaper 👻☆459Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆447Updated 10 months ago
- A repo to conduct vulnerability enrichment.☆563Updated this week
- #supply #chain #attack #detection☆501Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆208Updated this week
- Automation tool for Windows Deception Host Burn-In☆82Updated 2 months ago
- CI/CD Security Analyzer☆647Updated 3 months ago
- Validate the isolation posture of your container environment.☆244Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆236Updated last week
- ☆254Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆146Updated 2 months ago
- Threat-hunting tool for Linux☆441Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆211Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆562Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆156Updated 10 months ago
- Add a layer of active defense to your cloud applications.☆89Updated this week
- Chalk allows you to follow code from development, through builds and into production.☆366Updated this week
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- boostsecurityio/poutine☆252Updated this week
- The Internets #1 Subdomain Takeover Tool☆237Updated last month
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆181Updated this week
- Halberd : Multi-Cloud Attack Platform☆246Updated last week
- An open-source collection of API key rotation tutorials.☆63Updated 2 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆289Updated this week
- A standard for reducing log volume without sacrificing analytical capability☆199Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆79Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated 11 months ago