Loading...
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle.
Browse 738 application security tools
A web-based Android application dynamic analysis tool that provides real-time Frida instrumentation capabilities through a Flask interface with modular JavaScript hooking support.
A full python tool for analyzing Android files with various functionalities.
w3af is an open source web application security scanner that identifies over 200 types of vulnerabilities including XSS, SQL injection, and OS commanding in web applications.
A tool for extracting static and dynamic features from Android APKs.
Static security code scanner (SAST) for Node.js applications with Docker support and integrations with Slack.
A Node.js library for validating environment variables and providing immutable access to configuration values in applications.
Inspeckage is a dynamic analysis tool for Android applications that provides runtime behavior monitoring through API hooking and real-time system interaction tracking.
CakeFuzzer is an automated vulnerability discovery tool specifically designed for identifying security issues in CakePHP web applications with minimal false positives.
WebGoat is an OWASP-maintained deliberately insecure web application designed to teach web application security through hands-on exercises with intentional vulnerabilities.
A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.
A key and secret validation workflow tool built in Rust, supporting over 30 providers and exporting to JSON or CSV.
A CLI tool that performs security assessments on Joi validator schemas by testing them against various attack vectors including XSS, SQL injection, RCE, and SSRF.
A command-line Android APK vulnerability analyzer written in Rust that decompresses and scans APK files using rule-based detection to identify security issues.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
A Python-based Burp Suite extension that integrates Yara scanning capabilities for detecting patterns and signatures in web application traffic using custom Yara rules.
NodeGoat provides an environment to learn and address OWASP Top 10 security risks in Node.js web applications.
AuditJS is a command-line tool that scans JavaScript projects for known vulnerabilities and outdated packages in npm dependencies using the OSS Index API or Nexus IQ Server.
A comprehensive Android application analysis tool that provides device management, logcat analysis, file examination, and integration with security frameworks like MobSF and JD-GUI.
Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.
ConDroid is a concolic execution framework for Android applications that automates dynamic analysis by driving execution to specific code locations without manual interaction.
A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.
Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.
738 tools across 8 specializations · 235 free, 503 commercial
API Security
API security tools and platforms for protecting REST APIs, GraphQL endpoints, and web services from security threats and unauthorized access.
Application Security Posture Management
Application Security and Posture Management platforms that provide visibility into application security posture, risk assessment, and vulnerability management across software portfolios.
Dynamic Application Security Testing
Dynamic Application Security Testing (DAST) tools for dynamic application security testing that identify vulnerabilities in running web applications and APIs through automated scanning.
Common questions about Application Security tools, selection guides, pricing, and comparisons.
SAST (Static Application Security Testing) analyzes source code without running the application, catching vulnerabilities early in development. DAST (Dynamic Application Security Testing) tests running applications by sending requests and analyzing responses, finding runtime vulnerabilities. IAST (Interactive Application Security Testing) combines both by instrumenting the application during testing, providing real-time analysis with lower false positive rates than SAST or DAST alone.
A mature AppSec program typically includes: SAST for code-level vulnerability detection, SCA for open-source dependency risks, DAST for runtime testing, API security for protecting endpoints, secure code training for developers, and ASPM to unify visibility across all these tools. Start with SCA and SAST as they catch the most common vulnerabilities earliest in the development lifecycle.
Shift-left security means integrating security testing earlier in the software development lifecycle, ideally at the coding and CI/CD stages rather than waiting for production deployment. This approach uses tools like SAST, SCA, and IDE security plugins to catch vulnerabilities before they reach production, reducing remediation cost by up to 100x compared to finding issues in production.
SCA focuses specifically on identifying vulnerabilities in third-party libraries, open-source components, and software dependencies your application uses. SAST analyzes your own source code for security flaws. Since modern applications are 70-90% open-source code, SCA is essential for catching vulnerabilities in components you did not write but are responsible for securing.