owasp-dep-scan / blintLinks
BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generator for binaries.
☆392Updated last month
Alternatives and similar repositories for blint
Users that are interested in blint are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆292Updated 3 weeks ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆334Updated this week
- A repo to conduct vulnerability enrichment.☆655Updated this week
- Threat-hunting tool for Linux☆938Updated last month
- #supply #chain #attack #detection☆533Updated this week
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- Add a layer of active defense to your cloud applications.☆93Updated last week
- 💀 Don't fear the Reaper 👻☆555Updated this week
- boostsecurityio/poutine☆306Updated 2 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆208Updated this week
- Mirror of cisa.gov/kev data files☆51Updated last week
- Next Generation Software Composition Analysis (SCA) with Malicious Package Detection, Code Context & Policy as Code☆536Updated this week
- ☆262Updated 7 months ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆122Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated last week
- Validate the isolation posture of your container environment.☆291Updated 2 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆537Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆318Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆255Updated 7 months ago
- CI/CD Security Analyzer☆661Updated 4 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆174Updated 2 months ago
- Prevent merging of malicious code in pull requests☆226Updated 3 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆244Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 7 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆167Updated this week
- Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system…☆332Updated 2 weeks ago
- ☆73Updated 3 months ago
- A universal SBOM representation in protocol buffers☆293Updated last week
- Bitor Scanning Software☆391Updated this week