Bleach alternatives

Looking for an alternative tool to replace Bleach? During the review of Bleach we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. django-sudo ('sudo' for Django applications)
  2. django-guardian (per object permissions for Django)
  3. django-security (Security add-ons for Django)

These tools are ranked as the best alternatives to Bleach.

Alternatives (by score)

74

django-sudo

Introduction

For some destructive events like removing an account, you may want to revalidate if the user really wants to continue. To ensure it is the actual owner of the account, django-sudo requests authentication again within the web application. GitHub uses this as well for some events like ownership changes and deletions.

Project details

django-sudo is written in Python.

Strengths and weaknesses

  • + More than 10 contributors
  • + The source code of this software is available

    Typical usage

    • Application security

    django-sudo review

    74

    django-guardian

    Introduction

    The django-guardian project is typically used in environments and projects where the default Django permissions are not enough. For example, an application with multiple users and many objects may require detailed permissions on who can see a particular record. This could go as far as giving only the creator of a record (=object) access plus the people with a particular access level.

    Project details

    django-guardian is written in Python.

    Strengths and weaknesses

    • + More than 1000 GitHub stars
    • + The source code of this software is available
    • + Well-known tool

      Typical usage

      • Application security

      django-guardian review

      74

      django-security

      Introduction

      Django-security is an extension for developers seeking more security measures in their Django project. The toolkit can set or activate particular settings improving security. Examples of these settings include the use of particular HTTP headers that increase the security defenses of the web application.

      Part of the toolkit is middleware to enforce password strength, set the do-not-track header, enable content security policy (CSP), enable privacy policy (P3P), limit session length, use HTTPS (HSTS), XSS protection, and more.

      Project details

      django-security is written in Python.

      Strengths and weaknesses

      • + More than 10 contributors
      • + The source code of this software is available

        Typical usage

        • Application security

        django-security review

        78

        CIRCLean

        Introduction

        Malware regularly uses USB sticks to infect victims. This solution can convert documents with potentially harmful code into disarmed data formats. This converted data is then stored on a trusted device.

        Project details

        CIRCLean is written in shell script.

        Strengths and weaknesses

        • + The source code of this software is available

          Typical usage

          • Data sanitizing
          • Data transfers

          CIRCLean review

          60

          DocBleach

          Introduction

          Tools like DocBleach are useful when dealing a lot with documents from external parties or even unknown entities. It can scan a system and disarm any possible harmful embedded data or code structures from documents.

          Project details

          DocBleach is written in Java.

          Strengths and weaknesses

          • + The source code of this software is available

            Typical usage

            • Data sanitizing

            DocBleach review

            64

            CHIRON ELK

            Introduction

            CHIRON is a tool to provide network analytics based on the ELK stack. It is combined with Machine Learning threat detection using the Aktaion framework. Typical usage of the tool is home use and get the visibility of home internet devices. By leveraging the Aktaion framework, it helps with detection threats like ransomware, phishing, or other malicious traffic.

            Project details

            CHIRON ELK is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available
            • - No releases on GitHub available

            Typical usage

            • Network analysis
            • Network security monitoring
            • Network traffic analysis
            • Threat discovery

            CHIRON ELK review

            64

            Trawler

            Introduction

            Trawler can simplify the work that is related to collecting phishing information like reports. It can process the information and use the information for follow-up steps.

            Project details

            Trawler is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available
            • - No releases on GitHub available

            Typical usage

            • Data collection
            • Phishing attacks

            Trawler review

            70

            Xplico

            Introduction

            With Xplico analysis can be performed on captured internet traffic. The data stored in a pcap file can then be displayed and the related protocol data can be extracted from the capture file. This may include emails, HTTP sessions, VoIP calls, or anything that can be recognized and stored.

            Project details

            59

            socat

            Introduction

            Socat is a tool to share data between systems. It can leverage an existing connection, or set up a new channel between two systems. This can be useful to relay traffic, do a quick data transfer, or test other systems. Another option is to use it on the local system to add an encrypted channel.

            Project details

            socat is written in C.

            Strengths and weaknesses

            • + The source code of this software is available
            • + Well-known tool

              Typical usage

              • Data encryption
              • Data transfers

              socat review

              85

              django-axes

              Introduction

              This tool may be used by developers that work with the Django framework. It adds a security layer on top of the application by looking at login attempts and track them.

              Project details

              django-axes is written in Python.

              Strengths and weaknesses

              • + More than 50 contributors
              • + The source code of this software is available

                Typical usage

                • Application security

                django-axes review

                85

                django-defender (Django Defender)

                Introduction

                Django-defender is a reusable app for Django that blocks people from performing brute forcing login attempts.

                Project details

                django-defender is written in Python.

                Strengths and weaknesses

                • + More than 10 contributors
                • + The source code of this software is available

                  Typical usage

                  • Application security

                  django-defender review

                  Some relevant tool missing as an alternative to Bleach? Please contact us with your suggestion.