owasp-dep-scan / blintLinks
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
☆380Updated last week
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆291Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆318Updated this week
- A repo to conduct vulnerability enrichment.☆646Updated this week
- Pen Test Report Generation and Assessment Collaboration☆531Updated this week
- boostsecurityio/poutine☆301Updated 2 weeks ago
- 💀 Don't fear the Reaper 👻☆543Updated last week
- ☆261Updated 7 months ago
- Gram is Klarna's own threat model diagramming tool☆320Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆651Updated 2 months ago
- Next Generation Software Composition Analysis (SCA) with Malicious Package Detection, Code Context & Policy as Code☆511Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆314Updated this week
- #supply #chain #attack #detection☆527Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆570Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- Validate the isolation posture of your container environment.☆287Updated last week
- Halberd : Multi-Cloud Agentic Attack Tool☆282Updated this week
- A universal SBOM representation in protocol buffers☆289Updated 2 weeks ago
- Prevent merging of malicious code in pull requests☆225Updated 3 months ago
- ☆73Updated 3 months ago
- ☆293Updated 10 months ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆120Updated 4 months ago
- AssemblyLine 4: File triage and malware analysis☆334Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆694Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆310Updated last week
- Mirror of cisa.gov/kev data files☆50Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆204Updated this week
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆124Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆239Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆281Updated 4 months ago