Loading...
Static Application Security Testing (SAST) tools for static code analysis that detect security vulnerabilities and coding flaws in source code during development.
Browse 149 static application security testing tools
AI-powered automated code fix generation for security vulnerabilities
AI-powered automated code fix generation for security vulnerabilities
Scans development plans to identify design flaws before implementation.
Scans development plans to identify design flaws before implementation.
Detects exposed API keys, tokens, credentials & PII in code repositories
Detects exposed API keys, tokens, credentials & PII in code repositories
AI-powered code security fix generator for developer workflows
AI-powered code security fix generator for developer workflows
AI-native SAST tool that finds and fixes code vulnerabilities using LLMs
AI-native SAST tool that finds and fixes code vulnerabilities using LLMs
Source code malware scanner detecting backdoors and malicious code in repos
Source code malware scanner detecting backdoors and malicious code in repos
Binary code analysis service for security testing compiled applications
Binary code analysis service for security testing compiled applications
Source code review service to identify security vulnerabilities in applications
Source code review service to identify security vulnerabilities in applications
Application security testing product from Trace Security
Application security testing product from Trace Security
SAST-based source code security audit service by Tarlogic experts
SAST-based source code security audit service by Tarlogic experts
Prevents secrets & sensitive data leaks in code at source
Prevents secrets & sensitive data leaks in code at source
CI/CD security scanner for Jenkins that detects secrets and vulnerabilities
CI/CD security scanner for Jenkins that detects secrets and vulnerabilities
Hardware IP that obfuscates IC logic using camouflage gates for anti-cloning
Hardware IP that obfuscates IC logic using camouflage gates for anti-cloning
Software security risk assessment tool for source code analysis and testing
Software security risk assessment tool for source code analysis and testing
Scans source code repositories for exposed secrets and sensitive data
Scans source code repositories for exposed secrets and sensitive data
Formal verification of Amazon's s2n TLS library using SAW and Cryptol
Formal verification of Amazon's s2n TLS library using SAW and Cryptol
AI-powered code security platform for detecting and fixing vulnerabilities
AI-powered code security platform for detecting and fixing vulnerabilities
Advanced SAST engine with cross-file/function dataflow analysis capabilities
Advanced SAST engine with cross-file/function dataflow analysis capabilities
AI-powered SAST tool that triages findings and provides remediation guidance
AI-powered SAST tool that triages findings and provides remediation guidance
Detects hardcoded secrets in code using semantic analysis & validation
Detects hardcoded secrets in code using semantic analysis & validation
SAST solution that scans 30+ languages to find and fix code vulnerabilities
SAST solution that scans 30+ languages to find and fix code vulnerabilities
Code security platform for AI-generated and traditional code with runtime intel
Code security platform for AI-generated and traditional code with runtime intel
SAST tool with SCA, SBOM generation, and attack path analysis capabilities
SAST tool with SCA, SBOM generation, and attack path analysis capabilities
SAST tool for finding code quality & security defects in large-scale software
SAST tool for finding code quality & security defects in large-scale software
Common questions about Static Application Security Testing tools including selection guides, pricing, and comparisons.
Static Application Security Testing (SAST) tools for static code analysis that detect security vulnerabilities and coding flaws in source code during development.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox