Loading...
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle.
Browse 738 application security tools
A static analysis tool that detects Common Weakness Enumerations (CWEs) in ELF binaries across multiple CPU architectures using Ghidra-based disassembly and various analysis techniques.
A lightweight library for device identification and fingerprinting, written in Kotlin and 100% crash-free.
A tool to prevent prototype poisoning in JSON parsing.
A Fastify plugin that implements HTTP security headers through a wrapper around the helmet library to protect web applications from common vulnerabilities.
A Fastify plugin that provides utilities and middleware to protect web applications against Cross-Site Request Forgery (CSRF) attacks.
An unofficial Python API that enables programmatic searching, browsing, and downloading of Android apps from Google Play Store.
A command-line tool for downloading Android APK files from the Appland platform via npm installation.
Docker file for building Androguard dependencies with an optional interactive shell environment.
ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.
AppMon is a Frida-based automated framework for monitoring and tampering with system API calls across macOS, iOS, and Android applications.
CFGScanDroid is a Java utility that compares control flow graph signatures to Android method control flow graphs for malicious application detection.
idb is a tool that simplifies iOS penetration testing and security research tasks, available in both command line and GUI versions.
Curiefense is an application security platform that extends Envoy proxy to protect web applications and APIs against SQL injection, XSS, DDoS, and other common threats.
DOMPurify is a fast XSS sanitizer for HTML, MathML, and SVG.
OWASP WrongSecrets is an educational game that teaches proper secrets management by demonstrating common mistakes through interactive challenges across various deployment platforms.
A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.
Checkov is a static analysis tool that scans infrastructure as code and performs software composition analysis to detect security misconfigurations and vulnerabilities in cloud infrastructure and dependencies.
OpenRASP is a runtime application self-protection solution that integrates into application servers to monitor and block threats in real-time using context-aware instrumentation.
Python wrapper for Android APK decompilation with various converter and decompiler options.
A security checklist based on OWASP standards that provides comprehensive guidelines for designing, testing, and releasing secure Android applications.
An open-source framework that detects and prevents dependency confusion attacks across multiple package management systems and development environments.
738 tools across 8 specializations · 235 free, 503 commercial
API Security
API security tools and platforms for protecting REST APIs, GraphQL endpoints, and web services from security threats and unauthorized access.
Application Security Posture Management
Application Security and Posture Management platforms that provide visibility into application security posture, risk assessment, and vulnerability management across software portfolios.
Dynamic Application Security Testing
Dynamic Application Security Testing (DAST) tools for dynamic application security testing that identify vulnerabilities in running web applications and APIs through automated scanning.
Common questions about Application Security tools, selection guides, pricing, and comparisons.
SAST (Static Application Security Testing) analyzes source code without running the application, catching vulnerabilities early in development. DAST (Dynamic Application Security Testing) tests running applications by sending requests and analyzing responses, finding runtime vulnerabilities. IAST (Interactive Application Security Testing) combines both by instrumenting the application during testing, providing real-time analysis with lower false positive rates than SAST or DAST alone.
A mature AppSec program typically includes: SAST for code-level vulnerability detection, SCA for open-source dependency risks, DAST for runtime testing, API security for protecting endpoints, secure code training for developers, and ASPM to unify visibility across all these tools. Start with SCA and SAST as they catch the most common vulnerabilities earliest in the development lifecycle.
Shift-left security means integrating security testing earlier in the software development lifecycle, ideally at the coding and CI/CD stages rather than waiting for production deployment. This approach uses tools like SAST, SCA, and IDE security plugins to catch vulnerabilities before they reach production, reducing remediation cost by up to 100x compared to finding issues in production.
SCA focuses specifically on identifying vulnerabilities in third-party libraries, open-source components, and software dependencies your application uses. SAST analyzes your own source code for security flaws. Since modern applications are 70-90% open-source code, SCA is essential for catching vulnerabilities in components you did not write but are responsible for securing.