Heeler is an application security platform that provides runtime threat modeling and vulnerability management capabilities for organizations developing software applications. The platform focuses on analyzing open-source vulnerabilities in production applications through several key functions: - Runtime threat modeling to identify which vulnerabilities are actually reachable and exploitable in production environments - Automated remediation workflow management to streamline the fixing of identified vulnerabilities - CI/CD pipeline integration for implementing security guardrails and detecting material changes before production deployment - Centralized risk management with ownership routing and SLA tracking - Integration capabilities with third-party security tools and platforms - Real-time validation of remediation efforts - Automated root cause analysis for security issues The system helps organizations prioritize vulnerabilities based on business impact and production context, while providing evidence-based remediation guidance to development teams. It includes features for tracking application dependencies, mapping deployments to source code, and maintaining visibility of the application security posture across the software development lifecycle.
FEATURES
ALTERNATIVES
An AI-powered code security tool that analyzes code for vulnerabilities and provides automated fix suggestions to accelerate remediation.
A tool for building and installing PhoneyC with optional Python version configuration and root privileges.
A static application security testing (SAST) platform that performs comprehensive source code analysis to identify vulnerabilities, malware, and security issues in application code and dependencies.
Backslash Security is an application security platform that uses reachability analysis to enhance SAST and SCA, prioritize vulnerabilities, and provide remediation guidance.
A brute-force protection middleware for express routes that rate-limits incoming requests.
Real-time, eBPF-based Security Observability and Runtime Enforcement component
Automatic authorization enforcement detection extension for Burp Suite
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.