A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner. It helps to identify potential security vulnerabilities in a web application by analyzing its code and identifying potential entry and exit points. Tracy provides a detailed report of the findings, making it easier for developers to understand and fix the issues.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
A web application security testing platform that helps you test your knowledge on web application security through realistic scenarios with known vulnerabilities.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.