Eclypsium is a supply chain security platform that scans and monitors hardware, firmware, and software components in IT infrastructure. The platform provides: - Component-level inventory management and monitoring - Vulnerability detection in hardware and firmware components - Configuration assessment and hardening recommendations - Detection of firmware-level threats, rootkits, and bootkits - Integration capabilities with SIEM and ITSM systems - Compliance monitoring for firmware integrity and supply chain risk management The solution focuses on device integrity verification across various vendors including HP, Dell, Lenovo, and other major manufacturers, enabling organizations to verify the authenticity and security of their IT infrastructure components.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.
Steghide is a steganography program for hiding data in image and audio files.
StegSolve is a steganography analysis tool with image analysis features.
A cross-platform software library for interacting with iOS devices without jailbreaking.
Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.
An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.
House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
A next-generation file integrity monitoring and change detection system
Introspy-Android is a blackbox tool for understanding Android app behavior and identifying security issues at runtime.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.