owasp-dep-scan / blint
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
☆363Updated last week
Alternatives and similar repositories for blint:
Users that are interested in blint are comparing it to the libraries listed below
- Deep Linux runtime visibility meets Wireshark☆289Updated 3 weeks ago
- boostsecurityio/poutine☆267Updated last week
- Threat-hunting tool for Linux☆829Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆268Updated this week
- A universal SBOM representation in protocol buffers☆283Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆307Updated this week
- CI/CD Security Analyzer☆658Updated 2 months ago
- #supply #chain #attack #detection☆515Updated last week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆168Updated 2 weeks ago
- ☆259Updated 5 months ago
- Validate the isolation posture of your container environment.☆276Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 5 months ago
- Add a layer of active defense to your cloud applications.☆92Updated last week
- 💀 Don't fear the Reaper 👻☆506Updated this week
- A repo to conduct vulnerability enrichment.☆625Updated this week
- Chalk allows you to follow code from development, through builds and into production.☆373Updated last week
- Bitor Scanning Software☆373Updated 3 weeks ago
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system…☆324Updated last month
- Pen Test Report Generation and Assessment Collaboration☆520Updated this week
- ☆73Updated last month
- Halberd : Multi-Cloud Attack Tool☆272Updated 2 weeks ago
- Prevent merging of malicious code in pull requests☆220Updated last month
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆121Updated last week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆270Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆690Updated 2 weeks ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆293Updated this week
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆116Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆148Updated 5 months ago
- Aranya user library, daemon, and policy code☆172Updated this week