Loading...
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle.
Browse 738 application security tools
Package verification tool for npm with various verification and testing capabilities.
A collection of vulnerable web application test cases designed to benchmark and evaluate the effectiveness of static security analyzers and penetration testing tools.
Helm plugin for cryptographically signing and verifying charts with GnuPG integration.
An Emacs major mode that provides syntax highlighting and enhanced readability for smali code files used in Android malware analysis.
Container image definitions that create standardized testing environments for software applications with consistent dependencies and configurations.
Preflight is a Go-based verification tool that helps organizations validate scripts and executables to prevent supply chain attacks by enabling secure self-compilation and trusted distribution methods.
npm-zoo is a curated database of known malicious NPM packages that helps developers and security researchers identify and avoid potentially harmful dependencies in their projects.
An extensible, heuristic-based vulnerability scanning tool for installed npm packages.
A Python script that scans Nexus Repository Manager for artifacts with identical names across repositories to identify dependency confusion attack vulnerabilities.
A security tool that detects potential Dependency Confusion attack vectors by identifying private package names that are not reserved on public registries.
Protect against Prototype Pollution vulnerabilities in your application by freezing JavaScript objects.
A bash script that analyzes executable files to check security properties like PIE, RELRO, canaries, ASLR, and Fortify Source protections.
Automates the process of preparing Android APK files for HTTPS inspection
Android security virtual machine with updated tools and frameworks for reverse engineering and malware analysis.
DroidRA is an instrumentation-based Android security analysis tool that improves the accuracy of reflective call analysis through composite constant propagation techniques.
Runtime mobile exploration toolkit powered by Frida for assessing mobile app security without jailbreak.
Andromeda makes reverse engineering of Android applications faster and easier.
A community effort to compile security advisories for Ruby libraries with a detailed directory structure.
Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.
A tool to run YARA rules against node_module folders to identify suspicious scripts
Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.
Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.
738 tools across 8 specializations · 235 free, 503 commercial
API Security
API security tools and platforms for protecting REST APIs, GraphQL endpoints, and web services from security threats and unauthorized access.
Application Security Posture Management
Application Security and Posture Management platforms that provide visibility into application security posture, risk assessment, and vulnerability management across software portfolios.
Dynamic Application Security Testing
Dynamic Application Security Testing (DAST) tools for dynamic application security testing that identify vulnerabilities in running web applications and APIs through automated scanning.
Common questions about Application Security tools, selection guides, pricing, and comparisons.
SAST (Static Application Security Testing) analyzes source code without running the application, catching vulnerabilities early in development. DAST (Dynamic Application Security Testing) tests running applications by sending requests and analyzing responses, finding runtime vulnerabilities. IAST (Interactive Application Security Testing) combines both by instrumenting the application during testing, providing real-time analysis with lower false positive rates than SAST or DAST alone.
A mature AppSec program typically includes: SAST for code-level vulnerability detection, SCA for open-source dependency risks, DAST for runtime testing, API security for protecting endpoints, secure code training for developers, and ASPM to unify visibility across all these tools. Start with SCA and SAST as they catch the most common vulnerabilities earliest in the development lifecycle.
Shift-left security means integrating security testing earlier in the software development lifecycle, ideally at the coding and CI/CD stages rather than waiting for production deployment. This approach uses tools like SAST, SCA, and IDE security plugins to catch vulnerabilities before they reach production, reducing remediation cost by up to 100x compared to finding issues in production.
SCA focuses specifically on identifying vulnerabilities in third-party libraries, open-source components, and software dependencies your application uses. SAST analyzes your own source code for security flaws. Since modern applications are 70-90% open-source code, SCA is essential for catching vulnerabilities in components you did not write but are responsible for securing.