Heeler Logo

Heeler

0
Commercial
Visit Website

Heeler is an application security platform that provides runtime threat modeling and vulnerability management capabilities for organizations developing software applications. The platform focuses on analyzing open-source vulnerabilities in production applications through several key functions: - Runtime threat modeling to identify which vulnerabilities are actually reachable and exploitable in production environments - Automated remediation workflow management to streamline the fixing of identified vulnerabilities - CI/CD pipeline integration for implementing security guardrails and detecting material changes before production deployment - Centralized risk management with ownership routing and SLA tracking - Integration capabilities with third-party security tools and platforms - Real-time validation of remediation efforts - Automated root cause analysis for security issues The system helps organizations prioritize vulnerabilities based on business impact and production context, while providing evidence-based remediation guidance to development teams. It includes features for tracking application dependencies, mapping deployments to source code, and maintaining visibility of the application security posture across the software development lifecycle.

FEATURES

ALTERNATIVES

Insider is a source code analysis tool focusing on OWASP Top 10 vulnerabilities with easy integration into DevOps pipelines.

A free online tool to scan for DOM-based XSS vulnerabilities in HTML, JavaScript, and CSS files.

Deliberately vulnerable web application for educational purposes.

Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

Instrumentation-based approach for resolving reflective calls in Android apps.

Static code analyzer for Infrastructure as Code with 500+ security policies and support for various IaC tools and cloud platforms.

Scanning APK file for URIs, endpoints & secrets.

Backslash Security is an application security platform that uses reachability analysis to enhance SAST and SCA, prioritize vulnerabilities, and provide remediation guidance.

PINNED

Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Resources
PTJunior Logo

PTJunior

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

Offensive Security
CTIChef.com Detection Feeds Logo

CTIChef.com Detection Feeds

A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

Threat Management
OSINTLeak Logo

OSINTLeak

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

Digital Forensics
ImmuniWeb® Discovery Logo

ImmuniWeb® Discovery

ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Attack Surface Management
Checkmarx SCA Logo

Checkmarx SCA

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Application Security
Orca Security Logo

Orca Security

A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

Cloud Security
DryRun Logo

DryRun

A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Application Security