Bleach alternatives
Looking for an alternative tool to replace Bleach? During the review of Bleach we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- django-sudo ('sudo' for Django applications)
- django-guardian (per object permissions for Django)
- django-security (Security add-ons for Django)
These tools are ranked as the best alternatives to Bleach.
Alternatives (by score)
django-sudo
Introduction
For some destructive events like removing an account, you may want to revalidate if the user really wants to continue. To ensure it is the actual owner of the account, django-sudo requests authentication again within the web application. GitHub uses this as well for some events like ownership changes and deletions.
Project details
django-sudo is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Application security
django-guardian
Introduction
The django-guardian project is typically used in environments and projects where the default Django permissions are not enough. For example, an application with multiple users and many objects may require detailed permissions on who can see a particular record. This could go as far as giving only the creator of a record (=object) access plus the people with a particular access level.
Project details
django-guardian is written in Python.
Strengths and weaknesses
- + More than 1000 GitHub stars
- + The source code of this software is available
- + Well-known tool
Typical usage
- Application security
django-security
Introduction
Django-security is an extension for developers seeking more security measures in their Django project. The toolkit can set or activate particular settings improving security. Examples of these settings include the use of particular HTTP headers that increase the security defenses of the web application.
Part of the toolkit is middleware to enforce password strength, set the do-not-track header, enable content security policy (CSP), enable privacy policy (P3P), limit session length, use HTTPS (HSTS), XSS protection, and more.
Project details
django-security is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Application security
CIRCLean
Introduction
Malware regularly uses USB sticks to infect victims. This solution can convert documents with potentially harmful code into disarmed data formats. This converted data is then stored on a trusted device.
Project details
CIRCLean is written in shell script.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data sanitizing
- Data transfers
DocBleach
Introduction
Tools like DocBleach are useful when dealing a lot with documents from external parties or even unknown entities. It can scan a system and disarm any possible harmful embedded data or code structures from documents.
Project details
DocBleach is written in Java.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Data sanitizing
CHIRON ELK
Introduction
CHIRON is a tool to provide network analytics based on the ELK stack. It is combined with Machine Learning threat detection using the Aktaion framework. Typical usage of the tool is home use and get the visibility of home internet devices. By leveraging the Aktaion framework, it helps with detection threats like ransomware, phishing, or other malicious traffic.
Project details
CHIRON ELK is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Network analysis
- Network security monitoring
- Network traffic analysis
- Threat discovery
Trawler
Introduction
Trawler can simplify the work that is related to collecting phishing information like reports. It can process the information and use the information for follow-up steps.
Project details
Trawler is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Data collection
- Phishing attacks
Xplico
Introduction
With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.
Project details
socat
Introduction
Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.
Project details
socat is written in C.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Data encryption
- Data transfers
django-axes
Introduction
This tool may be used by developers that work with the Django framework. It adds a security layer on top of the application by looking at login attempts and track them.
Project details
django-axes is written in Python.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
Typical usage
- Application security
django-defender (Django Defender)
Introduction
Django-defender is a reusable app for Django that blocks people from performing brute forcing login attempts.Project details
django-defender is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Application security
Some relevant tool missing as an alternative to Bleach? Please contact us with your suggestion.