Loading...

Looking for alternatives to Digital.ai Application Security? App hardening platform with RASP, obfuscation, and threat monitoring. Browse 48 similar Application Security tools below, compare features side-by-side, and find the best fit for your security stack.
Codeless mobile app protection platform for Android and iOS applications
Android app protection tool with obfuscation, encryption, and RASP
C# obfuscation & encryption tool for .NET, MAUI, and Xamarin apps
Mobile app security solution protecting against reverse engineering & attacks
Runtime app protection for iOS & Android against tampering & malware
JavaScript obfuscation tool for protecting code from reverse engineering
Mobile app shielding and in-app protection for mobile applications
Binary-level firmware protection for embedded systems, no source code needed.
AI-powered mobile app security platform with device binding and threat detection
AI-driven mobile app hardening with cryptographic individualization
Korean cybersecurity firm offering mobile, network, app, and DB security products.
Runtime RASP platform securing Android & iOS apps with no-code deployment.
Mobile app security testing platform for Android and iOS apps
Unified mobile app security platform with SAST, DAST, and API testing
AI-powered mobile app security platform with SAST, DAST, and API testing
Server-side mobile app attestation verifying app integrity and API access
Risk assessment platform for third-party mobile apps in enterprise networks
Mobile app risk management platform for data security and privacy testing
Mobile app security testing platform for identifying data security risks
Mobile app security platform for enterprises across multiple industries
Mobile app SSL certificate pinning solution with dynamic configuration
Android app dynamic behavior analysis system using sandbox technology.
Mobile app security audit covering code review, DAST, SAST, and pentesting.
Training course for Android and iOS mobile app security testing and exploitation
ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
A comprehensive Android application analysis tool that provides device management, logcat analysis, file examination, and integration with security frameworks like MobSF and JD-GUI.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
Inspeckage is a dynamic analysis tool for Android applications that provides runtime behavior monitoring through API hooking and real-time system interaction tracking.
A web-based Android application dynamic analysis tool that provides real-time Frida instrumentation capabilities through a Flask interface with modular JavaScript hooking support.
Docker file for building Androguard dependencies with an optional interactive shell environment.
Runtime Mobile Security (RMS) is a powerful web interface powered by FRIDA for manipulating Android and iOS Apps at Runtime.
Needle is a discontinued open source modular framework for iOS application security assessments that was compatible with iOS 9 and iOS 10 before being replaced by Objection.
Redexer is a reengineering tool that parses, analyzes, and modifies Android DEX files for binary manipulation and permission analysis.
ReFlutter is a reverse engineering framework that uses patched Flutter libraries to enable dynamic analysis and traffic monitoring of Flutter mobile applications on Android and iOS platforms.
Andromeda makes reverse engineering of Android applications faster and easier.
Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.
An Emacs major mode that provides syntax highlighting and enhanced readability for smali code files used in Android malware analysis.
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
StaDynA is a system supporting security app analysis in the presence of dynamic code update features.
Cloud-based service for testing and analyzing Android and iOS apps for malware, vulnerabilities, and security threats.
Get strategic cybersecurity insights in your inbox