Security Tools
OWASP Top 10, ZAP, ASVS and other security standards and testing checklists. The platform covers:
Security Tools
IaC), and source code. Key features include:
SCA) and license compliance checksSAST risk detection and secrets discoveryIaC template security analysisSecurity Tools
npm/yarn, pip, Maven, NuGet, Composer, Dockerfile, etc.Security Tools
SonarQube is an enterprise-grade static code analysis platform that provides continuous code quality and security checks, helping teams discover vulnerabilities, code smells, and duplicated blocks during the development lifecycle. It supports self-hosted deployment and can integrate seamlessly into existing pipelines.
Core features and highlights
CI/CD, ensuring merge quality.Security Tools
Trivy is an open-source security scanner from Aqua Security focused on quickly detecting vulnerabilities and misconfigurations in container images, file systems, repositories, and IaC configurations, and can run seamlessly locally or in CI/CD pipelines.
Core features and highlights
Dockerfiles, Kubernetes manifests, and IaC (e.g., Terraform, CloudFormation);secrets leaks, and performs software composition analysis (SCA);Trivy can be embedded into existing workflows.
Major advantages and highlights
Security Tools
clair's HTTP API.Security Tools
KV, Transit, and PKI, and can authenticate and authorize via Tokens, AppRole, Kubernetes, cloud provider IAM, and more.
Security Tools
SSH, Kubernetes, databases, and internal web applications, with comprehensive auditing. Available as an open-source edition, Teleport Cloud (managed service), and an Enterprise edition to meet different deployment needs.
Security Tools
OAuth 2.0, OpenID Connect, and SAML.
Core Features & Highlights
LDAP, AD)Security Tools
SSO, OAuth, JWT support and multi-device session managementSecurity Tools
JWT and GoTrue, available for self-hosting or as a cloud service, making it easy to quickly add authentication to web and mobile apps.
Core features & highlights
Row Level Security (RLS) for fine-grained access controlRLSSecurity Tools
OpenID Connect, OAuth 2.0, and SAML, and includes an admin console, theme customization, session and token management, and fine-grained authorization policies.
Use Cases & Target Users
Security Tools
OAuth 2.0 protocol, covering specification explanations, implementation guides, and ecosystem links. The site organizes major authorization flows (such as Authorization Code, Client Credentials, PKCE, etc.), common security considerations, and reference implementations for quick reference.
适用场景与目标用户
Suitable for backend/frontend developers, architects, security engineers and technical decision-makers, for implementing third-party authorization, API protection, single sign-on, mobile and SPA app authorization, and related scenarios.
主要优势或亮点
Security Tools
JWT (JSON Web Token). It provides an interactive debugger that displays the header, payload and signature in real time, and can simulate signing algorithms (e.g. HS256, RS256) for quick verification.
Core features and highlights
JWTs online — paste or type a token and view results instantlyJWT specification. Also helpful for beginners to quickly understand the relationship between header, payload and signature.
Key advantages
Security Tools
Managed Rules, Rate Limiting, real-time logging, and visual policy management for easier troubleshooting and complianceSecurity Tools
jail rules to flexibly match log patternsiptables and nftables, with configurable email notifications or custom actionsfail2ban-client management interface, easy to integrate into scriptsSecurity Tools
CrowdSec is an open-source, community-driven collaborative intrusion detection and prevention engine that uses behavior analysis and shareable intelligence to identify and block malicious activity. It collects logs via a local agent, uses reusable rules/scenarios for detection, and enforces blocks or alerts via bouncer.
Key features
bouncers (firewall, proxy, cloud integrations) and a rich scenario library.Security Tools
ModSecurity engine, hosted at https://github.com/coreruleset/coreruleset. It uses pattern matching and anomaly scoring to detect common attacks (such as SQL injection, XSS, RCE, etc.) and can serve as the default protection layer for a WAF.
Key features & highlights
ModSecurity, nginx, Apache, etc.)