owasp-dep-scan / blintView external linksLinks
blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-of-Materials (SBOM) for supported binaries.
☆432Feb 5, 2026Updated last week
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below
Sorting:
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,205Jan 23, 2026Updated 3 weeks ago
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- ☆75Mar 19, 2025Updated 10 months ago
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,467Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Jun 20, 2025Updated 7 months ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Add a layer of active defense to your cloud applications.☆103Feb 7, 2026Updated last week
- secator - the pentester's swiss knife☆1,236Updated this week
- ☆51Dec 13, 2025Updated 2 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Nov 21, 2025Updated 2 months ago
- Deep Linux runtime visibility meets Wireshark☆302Nov 13, 2025Updated 3 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Dec 2, 2025Updated 2 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆684Jan 6, 2026Updated last month
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,360Jan 23, 2026Updated 3 weeks ago
- SSHamble: Unexpected Exposures in SSH☆1,173Jan 31, 2026Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- #supply #chain #attack #detection☆642Feb 7, 2026Updated last week
- The useful exploit finder☆825Jan 19, 2026Updated 3 weeks ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆234Jul 8, 2025Updated 7 months ago
- Gram is Klarna's own threat model diagramming tool☆328Jan 26, 2026Updated 2 weeks ago
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package manager…☆894Feb 7, 2026Updated last week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆754Feb 1, 2026Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆135Feb 3, 2026Updated last week
- Open Adversarial Exposure Validation Platform☆1,618Updated this week
- Tools for interacting with authentication packages using their individual message protocols☆368Feb 1, 2026Updated last week
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 2 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Oct 28, 2025Updated 3 months ago
- 💀 Don't fear the Reaper 👻☆816Feb 3, 2026Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆179Dec 11, 2025Updated 2 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- Threat-hunting tool for Linux☆1,035Feb 3, 2026Updated last week
- cloudgrep is grep for cloud storage☆326Feb 26, 2025Updated 11 months ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Jan 28, 2025Updated last year