You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10-28Lines changed: 10 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,6 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
129
129
-[Dockerfile](#dockerfile)
130
130
-[Embedded](#embedded)
131
131
-[Embedded Ruby (a.k.a. ERB, eRuby)](#erb)
132
-
-[Formatter](#formatter)
133
132
-[Gherkin](#gherkin)
134
133
-[HTML](#html)
135
134
-[JSON](#json)
@@ -176,8 +175,6 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
176
175
<h2>Ada</h2>
177
176
178
177
179
-
-[Codepeer](https://www.adacore.com/static-analysis/codepeer):copyright: — Detects run-time and logic errors.
180
-
181
178
-[Polyspace for Ada](https://www.mathworks.com/products/polyspace-ada.html):copyright: — Provide code verification that proves the absence of overflow, divide-by-zero, out-of-bounds array access, and certain other run-time errors in source code.
182
179
183
180
-[SPARK](https://www.adacore.com/about-spark):copyright: — Static analysis and formal verification toolset for Ada.
@@ -400,7 +397,7 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
400
397
401
398
-[effective_dart](https://pub.dev/packages/effective_dart) — Linter rules corresponding to the guidelines in Effective Dart
402
399
403
-
-[lint](https://github.com/passsy/dart-lint) — An opinionated, community-driven set of lint rules for Dart and Flutter projects. Like pedantic but stricter
400
+
-**lint**:warning: — An opinionated, community-driven set of lint rules for Dart and Flutter projects. Like pedantic but stricter
404
401
405
402
-**Linter for dart**:warning: — Style linter for Dart.
406
403
@@ -1452,8 +1449,6 @@ It supports multiple languages and is designed to be extensible, allowing you to
1452
1449
1453
1450
-[CodeFlow](https://www.getcodeflow.com):copyright: — Automated code analysis tool to deal with technical depth. Integrates with Bitbucket and Gitlab. (free for Open Source Projects)
1454
1451
1455
-
-[CodeIt.Right](https://submain.com/products/codeit.right.aspx):copyright: — CodeIt.Right™ provides a fast, automated way to ensure that your source code adheres to (your) predefined design and style guidelines as well as best coding practices.
1456
-
1457
1452
-[Codemodder](https://codemodder.io/) — Codemodder is a pluggable framework for building expressive codemods. Use Codemodder when you need more than a linter or code formatting tool. Use it to fix non-trivial security issues and other code quality problems.
1458
1453
1459
1454
-[codeql](https://github.com/github/codeql) — Deep code analysis - semantic queries and dataflow for several languages with VSCode plugin support.
@@ -1555,7 +1550,13 @@ It supports multiple languages and is designed to be extensible, allowing you to
1555
1550
1556
1551
-[MOPSA](https://mopsa.lip6.fr) — A static analyzer designed to easily reuse abstract domains across widely different languages (such as C and Python).
1557
1552
1558
-
-**oclint**:warning: — A static source code analysis tool to improve quality and reduce defects for C, C++ and Objective-C.
1553
+
-[Neurolint-CLI](https://neurolint.dev) — Deterministic code transformation tool using AST parsing and rule-based transformations.
1554
+
Automatically fixes 50+ issues including accessibility violations, hydration errors,
1555
+
React 19/Next.js 16 migrations, and configuration updates. Features 5-step fail-safe
1556
+
orchestration to ensure zero breaking changes. Specialized for React, Next.js, and TypeScript projects.
1557
+
1558
+
1559
+
-[oclint](http://oclint.org) — A static source code analysis tool to improve quality and reduce defects for C, C++ and Objective-C.
1559
1560
1560
1561
-[Offensive 360](https://offensive360.com/):copyright: — Commercial Static Code Analysis system doesn't require building the source code or pre-compilation.
1561
1562
@@ -1651,7 +1652,7 @@ It supports multiple languages and is designed to be extensible, allowing you to
1651
1652
1652
1653
-[Synopsys](https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html):copyright: — A commercial static analysis platform that allows for scanning of multiple languages (C/C++, Android, C#, Java, JS, PHP, Python, Node.JS, Ruby, Fortran, and Swift).
1653
1654
1654
-
-[Teamscale](https://www.cqse.eu/en/teamscale/overview/):copyright: — Static and dynamic analysis tool supporting more than 25 languages and direct IDE integration. Free hosting for Open Source projects available on request. Free academic licenses available.
1655
+
-[Teamscale](https://teamscale.com):copyright: — Static and dynamic analysis tool supporting more than 25 languages and direct IDE integration. Free hosting for Open Source projects available on request. Free academic licenses available.
1655
1656
1656
1657
-[TencentCodeAnalysis](https://tca.tencent.com/) — Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.
1657
1658
@@ -1757,8 +1758,6 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1757
1758
1758
1759
-[JEB Decompiler](https://www.pnfsoftware.com/):copyright: — Decompile and debug binary code. Break down and analyze document files. Android Dalvik, MIPS, ARM, Intel x86, Java, WebAssembly & Ethereum Decompilers.
1759
1760
1760
-
-[ktool](https://ktool.cynder.me/en/latest/ktool.html) — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.
1761
-
1762
1761
-[Malcat](https://malcat.fr/):copyright: — Hexadecimal editor and disassembler for malware analysis and binary file inspection. Supports over 50 file formats and multiple CPU architectures (x86/x64, MIPS, .NET, Python, VB p-code). Features rapid analysis, embedded file extraction, Yara signature scanning, anomaly detection, and Python scripting. Designed for malware analysts, SOC operators, incident responders, and CTF players.
1763
1762
1764
1763
-[Manalyze](https://github.com/JusticeRage/Manalyze) — A static analyzer, which checks portable executables for malicious content.
@@ -1831,7 +1830,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1831
1830
<h2>Configuration Management</h2>
1832
1831
1833
1832
1834
-
-[ansible-lint](https://docs.ansible.com/ansible-lint) — Checks playbooks for practices and behaviour that could potentially be improved.
1833
+
-[ansible-lint](https://ansible.readthedocs.io/projects/lint/) — Checks playbooks for practices and behaviour that could potentially be improved.
1835
1834
1836
1835
-[AWS CloudFormation Guard](https://github.com/aws-cloudformation/cloudformation-guard) — Check local CloudFormation templates against policy-as-code rules and generate rules from existing templates.
1837
1836
@@ -1991,17 +1990,6 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1991
1990
-[htmlbeautifier](https://github.com/threedaymonk/htmlbeautifier) — A normaliser/beautifier for HTML that also understands embedded Ruby. Ideal for tidying up Rails templates.
1992
1991
1993
1992
1994
-
<aname="formatter" />
1995
-
<h2>Formatter</h2>
1996
-
1997
-
1998
-
-[Neurolint-CLI](https://neurolint.dev) — Deterministic code transformation tool using AST parsing and rule-based transformations.
1999
-
Automatically fixes 50+ issues including accessibility violations, hydration errors,
2000
-
React 19/Next.js 16 migrations, and configuration updates. Features 5-step fail-safe
2001
-
orchestration to ensure zero breaking changes. Specialized for React, Next.js, and TypeScript projects.
2002
-
2003
-
2004
-
2005
1993
<aname="gherkin" />
2006
1994
<h2>Gherkin</h2>
2007
1995
@@ -2313,8 +2301,6 @@ Kani verifies:
2313
2301
2314
2302
-[kics](https://kics.io/) — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible
2315
2303
2316
-
-[ktool](https://ktool.cynder.me/en/latest/ktool.html) — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.
2317
-
2318
2304
-**kube-hunter**:warning: — Hunt for security weaknesses in Kubernetes clusters.
2319
2305
2320
2306
-[lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues
@@ -2341,14 +2327,10 @@ Kani verifies:
2341
2327
2342
2328
-**QuantifiedCode**:warning: — Automated code review & repair. It helps you to keep track of issues and metrics in your software projects, and can be easily extended to support new types of analyses.
2343
2329
2344
-
-[Rezilion](https://www.rezilion.com/):copyright: — Discovers vulnerabilities for all components in your environment, filters out 85% non-exploitable vulnerabilities and creates a remediation plan and open tickets to upgrade components that violate your security policy and/or patch automatically in CI.
2345
-
2346
2330
-[Safety](https://safetycli.com/) — Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.
2347
2331
2348
2332
-[scorecard](https://github.com/ossf/scorecard) — Security Scorecards - Security health metrics for Open Source
2349
2333
2350
-
-[SearchDiggity](https://resources.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/):copyright: — Identifies vulnerabilities in open source code projects hosted on Github, Google Code, MS CodePlex, SourceForge, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, etc.
2351
-
2352
2334
-[Steampunk Spotter](https://steampunk.si/spotter/):copyright: — Ansible Playbook Scanning Tool that analyzes and offers recommendations for your playbooks.
2353
2335
2354
2336
-[Symfony Insight](https://insight.symfony.com/):copyright: — Detect security risks, find bugs and provide actionable metrics for PHP projects.
Copy file name to clipboardExpand all lines: data/api/tools.json
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -3498,7 +3498,7 @@
3498
3498
"plans": null,
3499
3499
"description": "Static Code Analysis for R.",
3500
3500
"discussion": null,
3501
-
"deprecated": true,
3501
+
"deprecated": null,
3502
3502
"resources": null,
3503
3503
"reviews": null,
3504
3504
"demos": null,
@@ -11321,7 +11321,7 @@
11321
11321
"plans": null,
11322
11322
"description": "An opinionated, community-driven set of lint rules for Dart and Flutter projects. Like pedantic but stricter",
11323
11323
"discussion": null,
11324
-
"deprecated": null,
11324
+
"deprecated": true,
11325
11325
"resources": null,
11326
11326
"reviews": null,
11327
11327
"demos": null,
@@ -12102,7 +12102,7 @@
12102
12102
"plans": null,
12103
12103
"description": "Format markdown code blocks using your favorite code formatters.",
12104
12104
"discussion": null,
12105
-
"deprecated": false,
12105
+
"deprecated": null,
12106
12106
"resources": null,
12107
12107
"reviews": null,
12108
12108
"demos": null,
@@ -13033,7 +13033,7 @@
13033
13033
"plans": null,
13034
13034
"description": "A static source code analysis tool to improve quality and reduce defects for C, C++ and Objective-C.",
13035
13035
"discussion": null,
13036
-
"deprecated": true,
13036
+
"deprecated": null,
13037
13037
"resources": null,
13038
13038
"reviews": null,
13039
13039
"demos": null,
@@ -13777,7 +13777,7 @@
13777
13777
"plans": null,
13778
13778
"description": "Facebook's tools for code analysis, visualizations, or style-preserving source transformation for many languages.",
13779
13779
"discussion": null,
13780
-
"deprecated": true,
13780
+
"deprecated": null,
13781
13781
"resources": null,
13782
13782
"reviews": null,
13783
13783
"demos": null,
@@ -20430,7 +20430,7 @@
20430
20430
"plans": null,
20431
20431
"description": "Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.",
0 commit comments