Automate your software supply chain security with Sonatype Repository, a centralized platform for managing open source components. Block malicious open source at the door with Sonatype Repository Firewall. Build fast with centralized components and simplify SBOM compliance and monitoring with Sonatype SBOM Manager. Integrate with the tools, languages, and packages you already use. Align dev, security, and ops teams to fuel secure deployment with Sonatype Lifecycle. Manage vulnerability risks with Sonatype Vulnerability Scanner and enforce policy at scale with Sonatype OSS Index. Explore our software supply chain management story and innovate with us—explore opportunities at Sonatype.
FEATURES
ALTERNATIVES
A microservice for string padding to prevent global issues like the left-pad incident.
PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding
Search OpenBSD manual pages by keyword, section, or manual page name
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.