Detects cases of trojan source attacks that employ unicode bidi attacks to inject malicious code. If you're using ESLint, see eslint-plugin-anti-trojan-source for a purpose-built plugin to detect anti-trojan characters. This tool is important in identifying potential supply chain attacks where adversaries can inject malicious code into the source code of a project, slipping by unseen in the code review process.
FEATURES
ALTERNATIVES
Goof is a vulnerable Node.js demo application that includes a series of vulnerabilities and exploits
An application security platform that combines API discovery, multiple security testing methodologies, and continuous monitoring to protect modern applications throughout their development lifecycle.
Identifies misconfigured CloudFront domains vulnerable to hijacking
A tool for brute-forcing GET and POST parameters to discover potential vulnerabilities in web applications.
An ASPM platform that provides software supply chain security through risk assessment, prioritization, and protection mechanisms.
A tool that uses Apache mod_rewrite to redirect invalid URIs to a specified URL
A comprehensive cheatsheet for XSS filter evasion techniques.
An integrated application security platform that combines software composition analysis, container scanning, and runtime security monitoring to identify and prioritize vulnerabilities based on actual usage and risk.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.