blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-of-Materials (SBOM) for supported binaries.
☆438Mar 24, 2026Updated this week
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for …☆1,212Mar 9, 2026Updated 2 weeks ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆85Mar 17, 2026Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Simple ethernet interface traffic monitor and reporting tool☆94Mar 10, 2026Updated 2 weeks ago
- A universal SBOM representation in protocol buffers☆321Mar 2, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆138Mar 10, 2026Updated 2 weeks ago
- The AI automation platform built for security teams and agents.☆3,539Updated this week
- Creates CycloneDX Bill of Materials (BOM) for your projects from source and container images. Supports many languages and package manager …☆928Updated this week
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Jun 20, 2025Updated 9 months ago
- Code Hierarchy Exploration Net (chen)☆27Mar 9, 2026Updated 2 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- secator - the pentester's swiss knife☆1,249Mar 21, 2026Updated last week
- ☆56Dec 13, 2025Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆75Mar 19, 2025Updated last year
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Nov 22, 2023Updated 2 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆757Feb 1, 2026Updated last month
- #supply #chain #attack #detection☆646Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,393Mar 20, 2026Updated last week
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆694Jan 6, 2026Updated 2 months ago
- Gram is Klarna's own threat model diagramming tool☆331Mar 20, 2026Updated last week
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆60May 20, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- SSHamble: Unexpected Exposures in SSH☆1,178Feb 16, 2026Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆181Dec 11, 2025Updated 3 months ago
- Add a layer of active defense to your cloud applications.☆104Mar 14, 2026Updated 2 weeks ago
- Threat-hunting tool for Linux☆1,047Mar 16, 2026Updated last week
- A rewrite of YARA in Rust.☆1,068Updated this week
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,024Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- Tools for interacting with authentication packages using their individual message protocols☆424Mar 1, 2026Updated 3 weeks ago
- The useful exploit finder☆827Jan 19, 2026Updated 2 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆156Dec 2, 2025Updated 3 months ago
- This project aims to standardize the representation and management of EOL and EOS product information across the industry.☆30Mar 4, 2024Updated 2 years ago
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆75Apr 18, 2024Updated last year
- Open Adversarial Exposure Validation Platform☆1,647Updated this week