Impart Security is a web application firewall (WAF) and API security solution that provides protection for web applications and APIs. The platform offers several key functionalities: 1. API Discovery: Scans API traffic and CI/CD activity to create a catalog of API endpoints and parameters. 2. Runtime Protection: Implements real-time protection against OWASP Top 10 threats and API attacks. 3. API Testing: Performs vulnerability scanning in CI/CD pipelines and provides remediation guidance. 4. Posture Management: Monitors API security posture across multiple environments and enforces security policies. The solution integrates with existing security infrastructure and provides capabilities for API endpoint documentation, sensitive data detection, and rule-based protection mechanisms.
FEATURES
SIMILAR TOOLS
Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
A Nuxt 3 security module that automatically implements OWASP security patterns through HTTP headers, middleware, and various protection mechanisms including CSP, XSS validation, CORS, and CSRF protection.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.