Contrast Code Security Platform Logo

Contrast Code Security Platform

0
Commercial
Updated 11 March 2025
Visit Website

The Contrast Runtime Security Platform is a suite of application security tools that integrates security into the software development lifecycle (SDLC) and production environments. It includes the following components: - Contrast Protect: A runtime application self-protection (RASP) tool that detects and blocks attacks on known and unknown vulnerabilities in production applications. - Contrast Assess: An interactive application security testing (IAST) tool that analyzes code security during the testing phase of the SDLC. - Contrast Scan: A static application security testing (SAST) tool that identifies vulnerabilities in code before deployment. - Contrast SCA: A software composition analysis (SCA) tool that tests and secures third-party and open-source components used in applications. The platform integrates with various development, operations, and DevOps tools and pipelines. It uses instrumentation agents to embed security sensors into applications, enabling real-time vulnerability detection and protection across the SDLC and in production environments.

FEATURES

SIMILAR TOOLS

CFRipper is a Library and CLI security analyzer for AWS CloudFormation templates.

StepSecurity is a platform that enhances GitHub Actions security by providing network egress control, risk discovery, action replacement, and security best practices orchestration.

A serverless application that demonstrates common serverless security flaws and weaknesses

A Burp Suite content discovery plugin that adds smart functionality to the Buster plugin.

Cutting-edge technology for developing security applications within the Linux kernel.

WackoPicko is a vulnerable website with known vulnerabilities, now available as a Docker image and included in the OWASP Broken Web Applications Project.

A tool for dynamic analysis of mobile applications in a controlled environment.

Mitigate security concerns of Dependency Confusion supply chain security risks.

Utility for comparing control flow graph signatures to Android methods with scanning capabilities for malicious applications.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved