Categories
Can't Find What You Need?
Request a new integration that would make your work easier.
Hub Component Risk
Featured
by
Black Duck
Provides risk assessments open-source components analyzing vulnerabilities, license risks, and operational risks.
SCA
Terrascan
Tenable
Detects compliance violations across Infrastructure-as-Code before provisioning cloud infrastructure.
IaC
detect-secrets
Yelp
Prevents sensitive information such as passwords, API keys, and tokens from being committed to version control systems.
Secrets
Wapiti Scanner
Wapiti
Open-source vulnerability scanner with black-box testing, identifying security flaws such as SQL injection and XSS.
WAS
Horusec
Zup Innovation
Analyzes source code for vulnerabilities to identify and fix security issues early in the development process.
SAST
yarn audit
Yarn
Learn about yarn audit integration with AppSOC, enhancing your security by consolidating data and prioritizing critical threats. Contact us for a demo today.
SAST (JSON)
Veracode
Scans source code, binaries, and bytecode to identify security vulnerabilities without executing the application.
Wfuzz
Xavi Mendez
Tool for brute-forcing or fuzzing web applications to identify security vulnerabilities and issues such as XSS or SQLI.
Prowler
Verica
Open-source tool for AWS environments for security assessments, hardening guidance, and compliance auditing.
CI/CD
DSOP
US DoD
SAST framework tailored for the U.S. DoD that identifies vulnerabilities in source code during development.
SCA (JSON)
Identifies vulnerabilities in open-source components to manage security risks associated with these libraries.
Testssl.sh
TestSSL
Analyzes of SSL/TLS configurations, checking the protocols, ciphers, and cryptographic flaws in HTTPS connections.
DAST
HuskyCL
Open-source tool that performs security tests inside CI/CD pipelines to identify vulnerabilities before deployment.
Pentest-as-a-Service
HackerOne
Vulnerability coordination and bug bounty platform that connects businesses with cybersecurity researchers.
Pentesting
CSPM
Wiz
Visibility and security for cloud environments by identifying risks across applications, networks, and configurations.
Cloud
VulDB Vulnerability Database
VulDB
Database with detailed information on security vulnerabilities, risk assessments, affected systems, and available patches.
Feeds
Our expert team can assess your needs, show you a live demo, and recommend a solution that will save you time and money.