Platform
Solutions for AI
Solutions for AppSec
Case Studies
Learn
Company
Categories
Can't Find What You Need?
Request a new integration that would make your work easier.
SCA (JSON)
Featured
by
Veracode
Identifies vulnerabilities in open-source components to manage security risks associated with these libraries.
SCA
DSOP
US DoD
SAST framework tailored for the U.S. DoD that identifies vulnerabilities in source code during development.
SAST
Prowler
Verica
Open-source tool for AWS environments for security assessments, hardening guidance, and compliance auditing.
CI/CD
Wfuzz
Xavi Mendez
Tool for brute-forcing or fuzzing web applications to identify security vulnerabilities and issues such as XSS or SQLI.
SAST (JSON)
Scans source code, binaries, and bytecode to identify security vulnerabilities without executing the application.
yarn audit
Yarn
Learn about yarn audit integration with AppSOC, enhancing your security by consolidating data and prioritizing critical threats. Contact us for a demo today.
Horusec
Zup Innovation
Analyzes source code for vulnerabilities to identify and fix security issues early in the development process.
Wapiti Scanner
Wapiti
Open-source vulnerability scanner with black-box testing, identifying security flaws such as SQL injection and XSS.
WAS
detect-secrets
Yelp
Prevents sensitive information such as passwords, API keys, and tokens from being committed to version control systems.
Secrets
Terrascan
Tenable
Detects compliance violations across Infrastructure-as-Code before provisioning cloud infrastructure.
IaC
Hub Component Risk
Black Duck
Provides risk assessments open-source components analyzing vulnerabilities, license risks, and operational risks.
Crashtest
Scans running web applications to identify vulnerabilities like SQL injection and XSS from an external perspective.
DAST
WhiteHat Sentinel
Synopsys
Comprehensive WAS solution with both SAST and DAST to identify and remediate vulnerabilities.
TruffleHog
Truffle Security
Searches through git repositories for high entropy strings, secrets, exposed passwords and security tokens.
Coverity API
Integrates of static code analysis into development pipelines for scanning and management of code quality.
Trufflehog3
Updated version enhanced to scan deeper and faster for exposed secrets and sensitive information in codebases.
Our expert team can assess your needs, show you a live demo, and recommend a solution that will save you time and money.