Skip to content

Commit 246e5bc

Browse files
authored
Merge branch 'master' into corgea
2 parents 08b55a8 + 0e5e8f0 commit 246e5bc

21 files changed

+1156
-347
lines changed

_data/api-tools.yml

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -476,6 +476,15 @@
476476
runtime: "https://img.shields.io/badge/API_Runtime-No-red.svg"
477477
testing: "https://img.shields.io/badge/API_Testing-Yes-brightgreen.svg"
478478
notes: "<br/><em>Note: General http/web fuzzer which can also fuzz http-based APIs</em>"
479+
- name: "WuppieFuzz"
480+
link: "https://github.com/TNO-S3/WuppieFuzz"
481+
from: "TNO"
482+
license: "https://img.shields.io/badge/license-Apache%202-4EB1BA.svg"
483+
platforms: "https://img.shields.io/badge/Platform-Cross_Platform-inactive.svg"
484+
posture: "https://img.shields.io/badge/API_Posture-No-red.svg"
485+
runtime: "https://img.shields.io/badge/API_Runtime-No-red.svg"
486+
testing: "https://img.shields.io/badge/API_Testing-Yes-brightgreen.svg"
487+
notes: "<br/><em>Note: REST API fuzzing tool, Swagger/OpenAPI specification required</em>"
479488
- name: "Zed Attack Proxy (ZAP)"
480489
link: "https://www.zaproxy.org/"
481490
from: "Open Source supported by Checkmarx"
@@ -521,11 +530,11 @@
521530
testing: "https://img.shields.io/badge/API_Testing-Yes-brightgreen.svg"
522531
notes: "<br/><em>Note: Use Curl-like command or OpenAPI contract to perform API scan. An existing Github Action can perform a scan automatically before deployment.</em>"
523532
- name: "ZeroThreat"
524-
link: "https://zerothreat.ai/solutions/api-security-testing"
533+
link: "https://zerothreat.ai/api-security-testing"
525534
from: "ZeroThreat"
526535
license: "https://img.shields.io/badge/license-Commercial-9cf.svg"
527536
platforms: "https://img.shields.io/badge/Platform-SaaS%2C On--Prem-inactive.svg"
528537
posture: "https://img.shields.io/badge/API_Posture-Yes-brightgreen.svg"
529-
runtime: "https://img.shields.io/badge/API_Runtime-Yes-brightgreen.svg"
538+
runtime: "https://img.shields.io/badge/API_Runtime-No-red.svg"
530539
testing: "https://img.shields.io/badge/API_Testing-Yes-brightgreen.svg"
531540
notes: ""

_data/community_events.json

Lines changed: 168 additions & 278 deletions
Large diffs are not rendered by default.

_data/gsoc_admins.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,3 +8,10 @@
88
99
- name: Harold Blankenship
1010
11+
- year: 2025
12+
admins:
13+
- name: Fabio Cerullo
14+
15+
- name: Starr Brown
16+
17+

_data/tools.json

Lines changed: 66 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,39 @@
99
"type": "SAST"
1010
},
1111
{
12+
"title": "CVE Scanner",
13+
"url": "https://www.cvescanner.co.uk",
14+
"owner": "CVE Scanner",
15+
"license": "Commercial",
16+
"platforms": "SaaS",
17+
"note": "Real-time scanning of your domain for known CVEs is free. If any are found, a detailed breakdown of the identified CVEs is available for just £10, which includes two free rescans. We use a live black-box HTTP probing approach.",
18+
"type": "DAST"
19+
},
20+
{
21+
"title": "Astrée",
22+
"url": "https://www.absint.com/astree/index.htm",
23+
"owner": "AbsInt Angewandte Informatik GmbH",
24+
"license": "Commercial",
25+
"platforms": "Windows and Linux",
26+
"note": "Astrée is a static analyzer designed to prove the absence of runtime errors and further critical program defects, including code-level cybersecurity vulnerabilities like buffer overflows, data races, etc. It is based on abstract interpretation, a provably correct formal method. Astrée supports C and C++.",
27+
"type": "SAST"
28+
},
29+
{
30+
"title": "Panoptic Scans",
31+
"url": "https://panopticscans.com",
32+
"owner": "Panoptic Scans",
33+
"license": "Commercial",
34+
"platforms": "SaaS",
35+
"note": "Panoptic Scans enables automated network and application scans using tools like OpenVAS, ZAP, and Nmap. Users can schedule scans to meet compliance requirements for SOC 2, HIPAA, ISO 27001, NIST 800-53, and CMMC while detecting issues such as unpatched software, vulnerabilities, misconfigurations, and open ports.",
36+
"type": "DAST"
37+
},
38+
{
1239
"title": "ZeroPath",
1340
"url": "https://zeropath.com/",
1441
"owner": "ZeroPath",
1542
"license": "Commercial or Free",
1643
"platforms": "SaaS, On-Premises",
17-
"note": "Scans over 10 languages to identify and fix conventional technical vulnerabilities (e.g., XSS, SQL injection, SSRF) as well as business logic flaws and auth bugs.",
44+
"note": "ZeroPath is an AI Native SAST that scans over 15 languages to identify and fix conventional technical vulnerabilities (e.g., XSS, SQL injection, SSRF) as well as business logic flaws and auth bugs.",
1845
"type": "SAST"
1946
},
2047
{
@@ -23,7 +50,7 @@
2350
"owner": "joernio",
2451
"license": "Open Source or Free",
2552
"platforms": null,
26-
"note": "Scans C/C++/Java/Binary/Javascript/Python/Kotlin.",
53+
"note": "Scans C/C++/Java/Binary/Javascript/Python/Kotlin/JVM Bytecode/PHP/Go/Ruby/Swift/C#.",
2754
"type": "SAST"
2855
},
2956
{
@@ -110,10 +137,10 @@
110137
{
111138
"title": "ZeroThreat",
112139
"url": "https://zerothreat.ai",
113-
"owner": "ZeroThreat",
114-
"license": "Free",
115-
"platforms": "SaaS",
116-
"note": "ZeroThreat is a fast web app and API security scanner providing DAST capabilities with modern solutions for modern web applications, and it is free to use.",
140+
"owner": "ZeroThreat INC",
141+
"license": "Commercial or Free",
142+
"platforms": "SaaS or On-Premise",
143+
"note": "ZeroThreat is an AI-powered modern DAST tool built for today’s web applications and APIs.",
117144
"type": "DAST"
118145
},
119146
{
@@ -167,7 +194,7 @@
167194
"owner": "Escape",
168195
"license": "Commercial",
169196
"platforms": "SaaS",
170-
"note": "Run thousands of GraphQL security scans",
197+
"note": "Escape is a modern DAST with a native business logic security testing algorithm. It supports modern web frameworks, integrates easily into CI/CD pipelines, and provides framework-specific, developer-friendly code snippets.",
171198
"type": "DAST"
172199
},
173200
{
@@ -953,6 +980,15 @@
953980
"note": "20% off with OWASP20",
954981
"type": "DAST"
955982
},
983+
{
984+
"title": "WuppieFuzz",
985+
"url": "https://github.com/TNO-S3/WuppieFuzz",
986+
"owner": "TNO",
987+
"license": "Open Source",
988+
"platforms": "Windows, Linux, Macintosh",
989+
"note": "WuppieFuzz is a coverage-guided REST API fuzzer developed on top of LibAFL, targeting a wide audience of end-users, with a strong focus on ease-of-use, explainability of the discovered flaws and modularity. WuppieFuzz supports all three settings of testing (black box, grey box and white box).",
990+
"type": "DAST"
991+
},
956992
{
957993
"title": "Barrion",
958994
"url": "https://barrion.io/",
@@ -1388,10 +1424,10 @@
13881424
{
13891425
"title": "DerScanner",
13901426
"url": "https://derscanner.com/",
1391-
"owner": "DerScanner Ltd.",
1427+
"owner": "DerSecur Ltd.",
13921428
"license": "Commercial",
1393-
"platforms": null,
1394-
"note": "Capable of identifying vulnerabilities and backdoors (undocumented features) in over 30 programming languages by analyzing source code or executables, without requiring debug info.",
1429+
"platforms": "SaaS or On-Premises",
1430+
"note": "DerScanner is an AI-powered application security testing platform suitable for air-gapped environments. It combines SAST, DAST, IAST, MAST, SCA, and binary analysis into a unified solution, securing modern and legacy applications with support for 43 programming languages.",
13951431
"type": "SAST"
13961432
},
13971433
{
@@ -1857,9 +1893,9 @@
18571893
"title": "AppSweep",
18581894
"url": "https://www.guardsquare.com/appsweep-mobile-application-security-testing",
18591895
"owner": "Guardsquare",
1860-
"license": "Open Source or Free",
1896+
"license": "Commercial",
18611897
"platforms": "SaaS",
1862-
"note": "Mobile application security testing tool for compiled Android apps with support of CI/CD integration",
1898+
"note": "Mobile application security testing tool for compiled Android and iOS apps with support of CI/CD integration",
18631899
"type": "SAST"
18641900
},
18651901
{
@@ -2132,5 +2168,23 @@
21322168
"platforms": "SaaS",
21332169
"note": "ResilientX UEM provides an All-in-One Continuous Testing and Monitoring solution, by integrating ASM, DAST, CSPM",
21342170
"type": "DAST"
2171+
},
2172+
{
2173+
"title": "Agentic Radar",
2174+
"url": "https://github.com/splx-ai/agentic-radar",
2175+
"owner": "SplxAI",
2176+
"license": "Free",
2177+
"platforms": "Windows, Linux, MacOS",
2178+
"note": "Open-source CLI security scanner for agentic AI workflows. Scans your workflow’s source code, detects vulnerabilities, and generates an interactive visualization along with a detailed security report. Supports popular agentic frameworks like LangGraph, CrewAI, n8n, OpenAI Agents, and more.",
2179+
"type": "SAST"
2180+
},
2181+
{
2182+
"title": "Kusari Inspector",
2183+
"url": "https://kusari.dev",
2184+
"owner": "Kusari",
2185+
"license": "Commercial or Free",
2186+
"platforms": "SaaS",
2187+
"note": "Kusari Inspector seamlessly integrates software supply chain security analysis into your pull requests.",
2188+
"type": "SAST"
21352189
}
21362190
]

pages/Component_Analysis.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -317,6 +317,7 @@ and legal teams an opportunity to create solutions for healthy open source usage
317317
| [Grafeas] | Grafeas | Open Source | Cross Platform |
318318
| [Greenkeeper] | Greenkeeper | Open Source | SaaS |
319319
| [Ion Channel SA] | Ion Channel | Commercial | SaaS |
320+
| [Kusari] | Kusari | Freemium | SaaS |
320321
| [Libraries.io] | Tidelift | Open Source | SaaS |
321322
| [MergeBase] | MergeBase | Commercial | SaaS |
322323
| [Nexus IQ] | Sonatype | Commercial | Cross Platform |
@@ -373,6 +374,7 @@ and legal teams an opportunity to create solutions for healthy open source usage
373374
[Greenkeeper]: https://greenkeeper.io/
374375
[OSS Review Toolkit]: https://github.com/heremaps/oss-review-toolkit
375376
[Ion Channel SA]: https://ionchannel.io/
377+
[Kusari]: https://kusari.dev
376378
[Libraries.io]: https://libraries.io/
377379
[MergeBase]: http://mergebase.com/
378380
[Nexus IQ]: https://www.sonatype.com/

pages/Free_for_Open_Source_Application_Security_Tools.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ contributors:
99
- kingthorin
1010
- Niclas Gustafsson
1111
- Jason Hills
12+
- Thomas Rooijakkers
1213
tags: application security tools, tools
1314
permalink: /Free_for_Open_Source_Application_Security_Tools
1415

@@ -76,10 +77,9 @@ In addition, we are aware of the following commercial SAST tools that are free f
7677
- [CodeSweep - JetBrains Plugin](https://hclsw.co/codesweep-jetbrains) - Scans files upon saving them. The results show the location of a finding, type, and remediation advice. Auto-fix available with free trial or subscription.
7778
- [CodeSweep - GitHub Action](https://hclsw.co/codesweepgithub) - Scan the new code on a push/pull request using a GitHub action. Findings are highlighted in the `Files Changed` view and details about the issue and mitigation steps can be found in the `Actions` page. Unrestricted usage allowed with a free trial account.
7879
- [Aikido](https://www.aikido.dev/product) - Combines open source software with custom rules & features into a single dashboard with all your security findings. Includes both SAST and Library Analysis tools. [Free for small teams](https://www.aikido.dev/pricing).
79-
- [AppSweep](https://www.guardsquare.com/appsweep-mobile-application-security-testing) - a free for everyone mobile application security testing tool for Android and iOS. It analyzes the compiled application and does not require access to the source code. The tool performs security assessment not only of the executable code but also of application resources and configuration file. Integration into CI/CD is supported.
8080
- [Arnica](https://www.arnica.io/solution/code-security) - Scans all source code repositories for code risks (SAST, SCA, IaC, license violations, and low 3rd party reputation) and hardcoded secrets. The platform comes with a [freemium plan](https://www.arnica.io/pricing) for unlimited time and users count. The [pipelineless security approach](https://www.arnica.io/blog/ci-cd-pipeline-security-vs-ide-plugins-vs-pipelineless-security) is the value the company charges for, so the visibility remains always free.
81-
- [Corgea](https://corgea.com/) - An AI-powered SAST scanner that helps developers find and fix insecure code. It detects business logic flaws, broken authentication, API vulnerabilities and more with minimal false positives. Corgea automatically generates security fixes for developers to review and approve. Integrates with GitHub, GitLab, Azure DevOps, IDEs and CLI. [Free to use](https://corgea.com/pricing).
82-
81+
- [Corgea](https://corgea.com/) - An AI-native SAST scanner that helps developers find and fix insecure code. It detects business logic flaws, broken authentication, API vulnerabilities and more with minimal false positives. Corgea automatically generates security fixes for developers to review and approve. Integrates with GitHub, GitLab, Azure DevOps, IDEs and CLI. [Free to use](https://corgea.com/pricing).
82+
- [Kusari](https://kusari.dev/inspector) - Kusari Inspector seamlessly integrates software supply chain security analysis into your pull requests. This checks for bad dependencies, licenses, quality data. [Free for individual use](https://www.kusari.dev/pricing).
8383

8484
### DAST Tools
8585

@@ -113,6 +113,7 @@ capabilities. Our primary recommendation is to use one of these:
113113
- [VWT Digital's sec-helpers](https://github.com/vwt-digital/sec-helpers/tree/master) -
114114
Collection of dynamic security related helpers.
115115
Sec-helpers is a bundle of useful tests and validators to ensure the security of a given domain.
116+
- [WuppieFuzz](https://github.com/TNO-S3/WuppieFuzz) is a coverage-guided REST API fuzzer developed on top of LibAFL, targeting a wide audience of end-users, with a strong focus on ease-of-use, explainability of the discovered flaws and modularity. WuppieFuzz supports all three settings of testing (black box, grey box and white box).
116117

117118
We are not aware of any other commercial grade tools that offer their
118119
full featured DAST product free for open source projects.

pages/Fuzzing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,7 @@ Some fuzzing initiatives:
153153
- [APIFuzzer - fuzz test without coding](https://pypi.org/project/APIFuzzer/)
154154
- [Jazzer - fuzzing for the JVM](https://github.com/CodeIntelligenceTesting/jazzer)
155155
- [ForAllSecure Mayhem for API](https://forallsecure.com/mayhem-for-api)
156+
- [WuppieFuzz - coverage-guided for REST API](https://github.com/TNO-S3/WuppieFuzz)
156157

157158
#### Fuzzing Frameworks
158159

pages/attacks/Buffer_overflow_attack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Usage example:
6565
```console
6666
user@spin ~/inzynieria $ ./bo-simple // program start
6767
1234 // we enter "1234" string from the keyboard
68-
1234 // program prints out the conent of the buffer
68+
1234 // program prints out the content of the buffer
6969
user@spin ~/inzynieria $ ./bo-simple // start
7070
123456789012 // we enter "123456789012"
7171
123456789012 // content of the buffer "buf" ?!?!

pages/attacks/CSV_Injection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ begin with any of the following characters:
3333
- At (`@`)
3434
- Tab (`0x09`)
3535
- Carriage return (`0x0D`)
36+
- Line feed (`0x0A`)
3637

3738
Keep in mind that it is not sufficient to make sure that the untrusted user input does not start with these characters. You also need to take care of the field separator (e.g., '`,`', or '`;`') and quotes (e.g., `'`, or `"`), as attackers could use this to start a new cell and then have the dangerous character in the middle of the user input, but at the beginning of a cell.
3839

pages/attacks/Cryptanalysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ applied that makes cryptanalysis successful. An attacker may have other
2121
goals as well, such as:
2222

2323
- Total Break - Finding the secret key.
24-
- Gobal Deduction - Finding a functionally equivalent algorithm for encryption and decryption that does not require knowledge of the secret key.
24+
- Global Deduction - Finding a functionally equivalent algorithm for encryption and decryption that does not require knowledge of the secret key.
2525
- Information Deduction - Gaining some information about plaintexts or ciphertexts that was not previously known.
2626
- Distinguishing Algorithm - The attacker has the ability to distinguish the output of the encryption (ciphertext) from a random permutation of bits.
2727

0 commit comments

Comments
 (0)