Bleach alternatives

Looking for an alternative tool to replace Bleach? During the review of Bleach we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. CIRCLean (USB stick and drives cleaner)
  2. DocBleach (data sanitizing tool for documents)
  3. django-sudo ('sudo' for Django applications)

These tools are ranked as the best alternatives to Bleach.

Alternatives (by score)

100

CIRCLean

Introduction

Malware regularly uses USB sticks to infect victims. This solution can convert documents with potentially harmful code into disarmed data formats. This converted data is then stored on a trusted device.

Project details

CIRCLean is written in shell script.

Strengths and weaknesses

  • + The source code of this software is available

    Typical usage

    • Data sanitizing
    • Data transfers

    CIRCLean review

    60

    DocBleach

    Introduction

    Tools like DocBleach are useful when dealing a lot with documents from external parties or even unknown entities. It can scan a system and disarm any possible harmful embedded data or code structures from documents.

    Project details

    DocBleach is written in Java.

    Strengths and weaknesses

    • + The source code of this software is available

      Typical usage

      • Data sanitizing

      DocBleach review

      74

      django-sudo

      Introduction

      For some destructive events like removing an account, you may want to revalidate if the user really wants to continue. To ensure it is the actual owner of the account, django-sudo requests authentication again within the web application. GitHub uses this as well for some events like ownership changes and deletions.

      Project details

      django-sudo is written in Python.

      Strengths and weaknesses

      • + More than 10 contributors
      • + The source code of this software is available

        Typical usage

        • Application security

        django-sudo review

        97

        django-guardian

        Introduction

        The django-guardian project is typically used in environments and projects where the default Django permissions are not enough. For example, an application with multiple users and many objects may require detailed permissions on who can see a particular record. This could go as far as giving only the creator of a record (=object) access plus the people with a particular access level.

        Project details

        django-guardian is written in Python.

        Strengths and weaknesses

        • + More than 1000 GitHub stars
        • + The source code of this software is available
        • + Well-known tool

          Typical usage

          • Application security

          django-guardian review

          89

          django-security

          Introduction

          Django-security is an extension for developers seeking more security measures in their Django project. The toolkit can set or activate particular settings improving security. Examples of these settings include the use of particular HTTP headers that increase the security defenses of the web application.

          Part of the toolkit is middleware to enforce password strength, set the do-not-track header, enable content security policy (CSP), enable privacy policy (P3P), limit session length, use HTTPS (HSTS), XSS protection, and more.

          Project details

          django-security is written in Python.

          Strengths and weaknesses

          • + More than 10 contributors
          • + The source code of this software is available

            Typical usage

            • Application security

            django-security review

            64

            CHIRON ELK

            Introduction

            CHIRON is a tool to provide network analytics based on the ELK stack. It is combined with Machine Learning threat detection using the Aktaion framework. Typical usage of the tool is home use and get the visibility of home internet devices. By leveraging the Aktaion framework, it helps with detection threats like ransomware, phishing, or other malicious traffic.

            Project details

            CHIRON ELK is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available
            • - No releases on GitHub available

            Typical usage

            • Network analysis
            • Network security monitoring
            • Network traffic analysis
            • Threat discovery

            CHIRON ELK review

            59

            socat

            Introduction

            Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.

            Project details

            socat is written in C.

            Strengths and weaknesses

            • + The source code of this software is available
            • + Well-known tool

              Typical usage

              • Data encryption
              • Data transfers

              socat review

              64

              Trawler

              Introduction

              Trawler can simplify the work that is related to collecting phishing information like reports. It can process the information and use the information for follow-up steps.

              Project details

              Trawler is written in Python.

              Strengths and weaknesses

              • + The source code of this software is available
              • - No releases on GitHub available

              Typical usage

              • Data collection
              • Phishing attacks

              Trawler review

              70

              Xplico

              Introduction

              With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.

              Project details

              85

              django-axes

              Introduction

              This tool may be used by developers that work with the Django framework. It adds a security layer on top of the application by looking at login attempts and track them.

              Project details

              django-axes is written in Python.

              Strengths and weaknesses

              • + More than 50 contributors
              • + The source code of this software is available

                Typical usage

                • Application security

                django-axes review

                84

                django-defender (Django Defender)

                Introduction

                Django-defender is a reusable app for Django that blocks people from performing brute forcing login attempts.

                Project details

                django-defender is written in Python.

                Strengths and weaknesses

                • + More than 10 contributors
                • + The source code of this software is available

                  Typical usage

                  • Application security

                  django-defender review

                  Some relevant tool missing as an alternative to Bleach? Please contact us with your suggestion.