Essential tools and best practices for securing software applications throughout their lifecycle. Task: Security Audit
Explore 16 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A Burp extension for scanning JavaScript files for endpoint links
A simple Swagger-ui scanner that detects old versions vulnerable to various XSS attacks
Pre-commit hook for validating outgoing changeset
A tool to scan for CORS misconfigurations in web applications
Mitigate security concerns of Dependency Confusion supply chain security risks.
A tool for identifying potential security vulnerabilities in web applications
Open-Source framework for detecting and preventing dependency confusion leakage with a holistic approach and wide technology support.
A tool that safely installs packages with npm/yarn by auditing them as part of your install process.
Tool to inform about potential risks in project dependencies list.
CFRipper is a Library and CLI security analyzer for AWS CloudFormation templates.
Websecurify provides efficient ways to protect organizations with sophisticated technology and expert consultancy.
A tool for identifying potential security vulnerabilities in dependency configurations by checking for lingering free namespaces for private package names.
Identifies misconfigured CloudFront domains vulnerable to hijacking
A plugin for viewing, detecting weak configurations, and generating Content Security Policy headers.