You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -283,7 +283,7 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
283
283
284
284
-[Gendarme](https://www.mono-project.com/docs/tools+libraries/tools/gendarme) — Gendarme inspects programs and libraries that contain code in ECMA CIL format (Mono and .NET).
285
285
286
-
-**Infer#**:warning: — InferSharp (also referred to as Infer#) is an interprocedural and scalable static code analyzer for C#. Via the capabilities of Facebook's Infer, this tool detects null pointer dereferences and resource leaks.
286
+
-[Infer#](https://github.com/microsoft/infersharp) — InferSharp (also referred to as Infer#) is an interprocedural and scalable static code analyzer for C#. Via the capabilities of Facebook's Infer, this tool detects null pointer dereferences and resource leaks.
287
287
288
288
-[Meziantou.Analyzer](https://github.com/meziantou/Meziantou.Analyzer) — A Roslyn analyzer to enforce some good practices in C# in terms of design, usage, security, performance, and style.
289
289
@@ -1329,7 +1329,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1329
1329
<h2>Verilog/SystemVerilog</h2>
1330
1330
1331
1331
1332
-
-[Icarus Verilog](https://github.com/steveicarus/iverilog) — A Verilog simulation and synthesis tool that operates by compiling source code written in IEEE-1364 Verilog into some target format
1332
+
-**Icarus Verilog**:warning: — A Verilog simulation and synthesis tool that operates by compiling source code written in IEEE-1364 Verilog into some target format
1333
1333
1334
1334
-[svls](https://github.com/dalance/svls) — A Language Server Protocol implementation for Verilog and SystemVerilog, including lint capabilities.
1335
1335
@@ -1509,7 +1509,7 @@ It supports multiple languages and is designed to be extensible, allowing you to
1509
1509
1510
1510
-[lizard](https://github.com/terryyin/lizard) — Lizard is an extensible Cyclomatic Complexity Analyzer for many programming languages including C/C++ (doesn't require all the header files or Java imports). It also does copy-paste detection (code clone detection/code duplicate detection) and many other forms of static code analysis. Counts lines of code without comments, CCN (cyclomatic complexity number), token count of functions, parameter count of functions.
1511
1511
1512
-
-[Mega-Linter](https://nvuillam.github.io/mega-linter/) — Mega-Linter can handle any type of project thanks to its 70+ embedded Linters,
1512
+
-[Mega-Linter](https://megalinter.io/) — Mega-Linter can handle any type of project thanks to its 70+ embedded Linters,
1513
1513
its advanced reporting, runnable on any CI system or locally,
1514
1514
with assisted installation and configuration, able to apply formatting and fixes
1515
1515
@@ -1611,7 +1611,7 @@ It supports multiple languages and is designed to be extensible, allowing you to
1611
1611
1612
1612
-[Teamscale](https://www.cqse.eu/en/teamscale/overview/):copyright: — Static and dynamic analysis tool supporting more than 25 languages and direct IDE integration. Free hosting for Open Source projects available on request. Free academic licenses available.
1613
1613
1614
-
-[TencentCodeAnalysis](https://tca.tencent.com/) — Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.
1614
+
-**TencentCodeAnalysis**:warning: — Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.
1615
1615
1616
1616
-[ThreatMapper](https://github.com/deepfence/ThreatMapper) — Vulnerability Scanner and Risk Evaluation for containers, serverless and hosts at runtime. ThreatMapper generates runtime BOMs from dependencies and operating system packages, matches against multiple threat feeds, scans for unprotected secrets, and scores issues based on severity and risk-of-exploit.
1617
1617
@@ -1705,7 +1705,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1705
1705
1706
1706
-[Ghidra](https://ghidra-sre.org) — A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
1707
1707
1708
-
-[Hopper](https://www.hopperapp.com/):copyright: — macOS and Linux reverse engineering tool that lets you disassemble, decompile and debug applications. Hopper displays the code using different representations, e.g. the Control Flow Graph, and the pseudo-code of a procedure. Supports Apple Silicon.
1708
+
-**Hopper**:warning::copyright: — macOS and Linux reverse engineering tool that lets you disassemble, decompile and debug applications. Hopper displays the code using different representations, e.g. the Control Flow Graph, and the pseudo-code of a procedure. Supports Apple Silicon.
@@ -1882,7 +1882,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1882
1882
1883
1883
-[Goblint](https://goblint.in.tum.de) — A static analyzer for the analysis of multi-threaded C programs. Its primary focus is the detection of data races, but it also reports other runtime errors, such as buffer overflows and null-pointer dereferences.
1884
1884
1885
-
-[PullRequest](https://www.pullrequest.com):copyright: — Code review as a service with built-in static analysis. Increase velocity and reduce technical debt through quality code review by expert engineers backed by best-in-class automation.
1885
+
-[PullRequest](https://www.hackerone.com/product/code):copyright: — Code review as a service with built-in static analysis. Increase velocity and reduce technical debt through quality code review by expert engineers backed by best-in-class automation.
1886
1886
1887
1887
-**quality**:warning: — Runs quality checks on your code using community tools, and makes sure your numbers don't get any worse over time.
1888
1888
@@ -2017,7 +2017,7 @@ but with the following improvements:
2017
2017
<h2>LaTeX</h2>
2018
2018
2019
2019
2020
-
-[ChkTeX](http://www.nongnu.org/chktex) — A linter for LaTex which catches some typographic errors LaTeX oversees.
2020
+
-**ChkTeX**:warning: — A linter for LaTex which catches some typographic errors LaTeX oversees.
2021
2021
2022
2022
-[lacheck](https://www.ctan.org/pkg/lacheck) — A tool for finding common mistakes in LaTeX documents.
2023
2023
@@ -2201,7 +2201,7 @@ It does this by running periodic diff outputs against heuristically crafted rege
2201
2201
2202
2202
-[gokart](https://github.com/praetorian-inc/gokart) — Golang security analysis with a focus on minimizing false positives. It is capable of tracing the source of variables and function arguments to determine whether input sources are safe.
2203
2203
2204
-
-[HasMySecretLeaked](https://gitguardian.com/hasmysecretleaked):copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2204
+
-**HasMySecretLeaked**:warning::copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2205
2205
2206
2206
-**iblessing**:warning: — iblessing is an iOS security exploiting toolkit. It can be used for reverse engineering, binary analysis and vulnerability mining.
2207
2207
@@ -2364,7 +2364,7 @@ TruffleHog is an open source secret-scanning engine that resolves exposed secret
2364
2364
2365
2365
-[GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
2366
2366
2367
-
-[HasMySecretLeaked](https://gitguardian.com/hasmysecretleaked):copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2367
+
-**HasMySecretLeaked**:warning::copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
"description": "A linter for LaTex which catches some typographic errors LaTeX oversees.",
2455
2455
"discussion": null,
2456
-
"deprecated": null,
2456
+
"deprecated": true,
2457
2457
"resources": null,
2458
2458
"reviews": null,
2459
2459
"demos": null,
@@ -5989,12 +5989,7 @@
5989
5989
"description": "Dodgy is a very basic tool to run against your codebase to search for \"dodgy\" looking values. It is a series of simple regular expressions designed to detect things such as accidental SCM diff checkins, or passwords or secret keys hard coded into files.",
5990
5990
"discussion": null,
5991
5991
"deprecated": null,
5992
-
"resources": [
5993
-
{
5994
-
"title": "Python linters for better code quality",
"description": "HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.",
9043
9038
"discussion": null,
9044
-
"deprecated": null,
9039
+
"deprecated": true,
9045
9040
"resources": null,
9046
9041
"reviews": null,
9047
9042
"demos": null,
@@ -9603,7 +9598,7 @@
9603
9598
"plans": null,
9604
9599
"description": "A Verilog simulation and synthesis tool that operates by compiling source code written in IEEE-1364 Verilog into some target format",
9605
9600
"discussion": null,
9606
-
"deprecated": null,
9601
+
"deprecated": true,
9607
9602
"resources": null,
9608
9603
"reviews": null,
9609
9604
"demos": null,
@@ -11728,7 +11723,7 @@
11728
11723
"plans": null,
11729
11724
"description": "Format markdown code blocks using your favorite code formatters.",
"description": "Enterprise vulnerability scanner for Android and iOS apps. It allows app owners and developers to secure each new version of a mobile app by integrating Oversecured into the development process.",
"description": "Code review as a service with built-in static analysis. Increase velocity and reduce technical debt through quality code review by expert engineers backed by best-in-class automation.",
15061
15040
"discussion": null,
@@ -19726,7 +19705,7 @@
19726
19705
"plans": null,
19727
19706
"description": "Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.",
description: Checks your code and infra (various Git repositories supported, cloud stacks, CLI, Web Interface platform, integrationss available) for security and quality issues. Code Scanning/SAST/Linting using many tools/Scanners deduplicated with One Report (AI optional).
Copy file name to clipboardExpand all lines: data/tools/dodgy.yml
-3Lines changed: 0 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,3 @@ types:
9
9
source: "https://github.com/landscapeio/dodgy"
10
10
homepage: "https://github.com/landscapeio/dodgy"
11
11
description: Dodgy is a very basic tool to run against your codebase to search for "dodgy" looking values. It is a series of simple regular expressions designed to detect things such as accidental SCM diff checkins, or passwords or secret keys hard coded into files.
0 commit comments