Ossprey is a software supply chain security platform that focuses on detecting malicious open source code and securing development environments. The platform provides deep supply chain insight by mapping every dependency and inspecting source code at the repository level to verify trust and integrity before build or deployment processes. The tool features a proprietary AI code scanner designed to identify malicious or risky packages in real-time, specifically targeting threats commonly found in open source ecosystems. It offers automated policy enforcement and early warning indicators tailored to specific technology stacks to prevent malicious code from entering development environments. Ossprey operates as a cybersecurity platform that analyzes open source dependencies and provides threat intelligence related to software supply chain risks. The service includes monitoring capabilities for domain resurrection attacks, zombie dependencies, and other supply chain vulnerabilities that can affect software development workflows. The platform targets both engineers and CISOs, providing different use cases for technical implementation and executive oversight of software supply chain security programs. It offers dashboard access for users to monitor their software supply chain security posture and manage detected threats.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Nuxt 3 security module that automatically implements OWASP security patterns through HTTP headers, middleware, and various protection mechanisms including CSP, XSS validation, CORS, and CSRF protection.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.