Yosai alternatives
Looking for an alternative tool to replace Yosai? During the review of Yosai we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Alternatives (by score)
Bandit
Introduction
Bandit is a tool that can be used during development or afterward. Typically this is used by developers to find common security issues in Python code before putting the code in production. Another use-case would be to use this tool to analyze existing projects and find possible flaws.
Project details
Bandit is written in Python.
Strengths and weaknesses
- + More than 50 contributors
- + The source code of this software is available
- + Supported by a large company
Typical usage
- Code analysis
PyT (Python Taint)
Introduction
Python Taint (or PyT) is a static code analyzer for Python scripts and applications. It tries to discover vulnerabilities or other possible weaknesses.Project details
PyT is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Code analysis
Safety
Introduction
When having applications deployed in your environment, not all of those may be installed via a package manager. When your infrastructure grows, it becomes even harder to know which tools are properly patched and which ones are not. For Python applications, this is where Safety comes in that can help scan installed software components via pip. It will also look at any of the dependencies that are installed.
Project details
Safety is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
- Security monitoring
- Vulnerability scanning
gauntlt
Introduction
Gauntlt allows you to run different attacks on your code with the goal to build better software and withstand the biggest threats in existence.
Project details
gauntlt is written in Ruby.
Strengths and weaknesses
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Code analysis
Fail2ban
Introduction
Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacksProject details
Fail2ban is written in Python.
Strengths and weaknesses
- + More than 2000 GitHub stars
- + The source code of this software is available
Typical usage
- Network traffic filtering
- Security monitoring
LogonTracer
Introduction
LogonTracer is a tool to investigate malicious logins from Windows event logs with visualization capabilities.
Project details
LogonTracer is written in Python.
Strengths and weaknesses
- + More than 500 contributors
- + The source code of this software is available
Typical usage
- Criminal investigations
- Digital forensics
- Learning
django-two-factor-auth (Django Two-Factor Authentication)
Introduction
A complete Two-Factor Authentication for Django. It leverages the django-otp tooling together with Django's authentication framework.Project details
eapmd5pass
Introduction
A tool like this would be most likely used to show the weakness of old authentication protocols, including penetration testing.
Project details
eapmd5pass is written in C.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Network analysis
- Password discovery
- Penetration testing
pyelftools
Introduction
This toolkit is used by other software, or standalone. Its main purpose is to parse binary ELF files and DWARF debugging information. This can be useful during malware analysis or troubleshooting issues with programs.
Project details
pyelftools is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Binary analysis
- Malware analysis
uncompyle6
Introduction
A decompiler like uncompyle6 can be used to investigate Python-based software components that are compiled. These files can be recognized by their .pyc file extension.
This tool has been written as several other decompilers were no longer maintained. So far this software seems to have a good number of contributors and regular updates.
Project details
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Binary analysis
- Code analysis
Some relevant tool missing as an alternative to Yosai? Please contact us with your suggestion.