Loading...
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle.
Browse 738 application security tools
Lint lockfiles for improved security and trust policies.
ESLint plugin to prevent Trojan Source attacks.
Detect trojan source attacks that employ unicode bidi attacks to inject malicious code.
QARK is a static analysis tool that scans Android applications for security vulnerabilities and can generate proof-of-concept exploits for discovered issues.
A set of tools for securing JavaScript projects against software supply chain attacks.
Fuzzapi is a Rails application with a user-friendly UI for API_Fuzzer gem and Docker setup.
A deliberately vulnerable Android application containing multiple security flaws designed for educational purposes and security training.
IronBee is an open source web application security sensor framework that provides detection and prevention capabilities for web application vulnerabilities.
A library for forward compatibility with PHP password functions.
A library for generating random numbers and strings of various strengths, useful in security contexts.
Insider is an open-source CLI tool that performs static source code analysis to detect OWASP Top 10 vulnerabilities across multiple programming languages including Java, Kotlin, Swift, .NET, C#, and JavaScript.
CuckooDroid extends Cuckoo Sandbox to provide automated dynamic analysis of Android applications in a controlled sandbox environment.
Introspy-Android is a dynamic analysis framework that hooks Android APIs at runtime to monitor application behavior and identify security vulnerabilities on rooted devices.
A Node.js middleware module that automatically enforces HTTPS connections by redirecting HTTP requests to HTTPS URLs in Express.js applications.
Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.
JSON.parse() drop-in replacement with prototype poisoning protection.
A command line tool that automates vulnerability scanning of Ruby gems and Rails stack components by identifying CVE vulnerabilities in detected technology versions.
A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.
A Python tool for patching Dalvik bytecode in DEX files and assisting in Android application analysis
A standalone binary inspection tool for Android developers with support for various formats and dependencies.
NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.
JAADAS is a powerful tool for static analysis of Android applications, providing features like API misuse analysis and inter-procedure dataflow analysis.
738 tools across 8 specializations · 235 free, 503 commercial
API Security
API security tools and platforms for protecting REST APIs, GraphQL endpoints, and web services from security threats and unauthorized access.
Application Security Posture Management
Application Security and Posture Management platforms that provide visibility into application security posture, risk assessment, and vulnerability management across software portfolios.
Dynamic Application Security Testing
Dynamic Application Security Testing (DAST) tools for dynamic application security testing that identify vulnerabilities in running web applications and APIs through automated scanning.
Common questions about Application Security tools, selection guides, pricing, and comparisons.
SAST (Static Application Security Testing) analyzes source code without running the application, catching vulnerabilities early in development. DAST (Dynamic Application Security Testing) tests running applications by sending requests and analyzing responses, finding runtime vulnerabilities. IAST (Interactive Application Security Testing) combines both by instrumenting the application during testing, providing real-time analysis with lower false positive rates than SAST or DAST alone.
A mature AppSec program typically includes: SAST for code-level vulnerability detection, SCA for open-source dependency risks, DAST for runtime testing, API security for protecting endpoints, secure code training for developers, and ASPM to unify visibility across all these tools. Start with SCA and SAST as they catch the most common vulnerabilities earliest in the development lifecycle.
Shift-left security means integrating security testing earlier in the software development lifecycle, ideally at the coding and CI/CD stages rather than waiting for production deployment. This approach uses tools like SAST, SCA, and IDE security plugins to catch vulnerabilities before they reach production, reducing remediation cost by up to 100x compared to finding issues in production.
SCA focuses specifically on identifying vulnerabilities in third-party libraries, open-source components, and software dependencies your application uses. SAST analyzes your own source code for security flaws. Since modern applications are 70-90% open-source code, SCA is essential for catching vulnerabilities in components you did not write but are responsible for securing.