Yosai alternatives

Looking for an alternative tool to replace Yosai? During the review of Yosai we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Bandit (Python static code analyzer)
  2. PyT (static code analyzer for Python)
  3. Safety (vulnerability scanner for software dependencies)

These tools are ranked as the best alternatives to Yosai.

Alternatives (by score)

85

Bandit

Introduction

Bandit is a tool that can be used during development or afterward. Typically this is used by developers to find common security issues in Python code before putting the code in production. Another use-case would be to use this tool to analyze existing projects and find possible flaws.

Project details

Bandit is written in Python.

Strengths and weaknesses

  • + More than 50 contributors
  • + The source code of this software is available
  • + Supported by a large company

    Typical usage

    • Code analysis

    Bandit review

    60

    PyT (Python Taint)

    Introduction

    Python Taint (or PyT) is a static code analyzer for Python scripts and applications. It tries to discover vulnerabilities or other possible weaknesses.

    Project details

    PyT is written in Python.

    Strengths and weaknesses

    • + The source code of this software is available

      Typical usage

      • Code analysis

      PyT review

      97

      Safety

      Introduction

      When having applications deployed in your environment, not all of those may be installed via a package manager. When your infrastructure grows, it becomes even harder to know which tools are properly patched and which ones are not. For Python applications, this is where Safety comes in that can help scan installed software components via pip. It will also look at any of the dependencies that are installed.

      Project details

      Safety is written in Python.

      Strengths and weaknesses

      • + More than 10 contributors
      • + The source code of this software is available

        Typical usage

        • Penetration testing
        • Security assessment
        • Security monitoring
        • Vulnerability scanning

        Safety review

        74

        gauntlt

        Introduction

        Gauntlt allows you to run different attacks on your code with the goal to build better software and withstand the biggest threats in existence.

        Project details

        gauntlt is written in Ruby.

        Strengths and weaknesses

        • + More than 10 contributors
        • + More than 500 GitHub stars
        • + The source code of this software is available

          Typical usage

          • Code analysis

          gauntlt review

          74

          Fail2ban

          Introduction

          Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks

          Project details

          Fail2ban is written in Python.

          Strengths and weaknesses

          • + More than 2000 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Network traffic filtering
            • Security monitoring

            Fail2ban review

            84

            LogonTracer

            Introduction

            LogonTracer is a tool to investigate malicious logins from Windows event logs with visualization capabilities.

            Project details

            LogonTracer is written in Python.

            Strengths and weaknesses

            • + More than 500 contributors
            • + The source code of this software is available

              Typical usage

              • Criminal investigations
              • Digital forensics
              • Learning

              LogonTracer review

              60

              django-two-factor-auth (Django Two-Factor Authentication)

              Introduction

              A complete Two-Factor Authentication for Django. It leverages the django-otp tooling together with Django's authentication framework.

              Project details

              60

              eapmd5pass

              Introduction

              A tool like this would be most likely used to show the weakness of old authentication protocols, including penetration testing.

              Project details

              eapmd5pass is written in C.

              Strengths and weaknesses

              • + The source code of this software is available

                Typical usage

                • Network analysis
                • Password discovery
                • Penetration testing

                eapmd5pass review

                85

                pyelftools

                Introduction

                This toolkit is used by other software, or standalone. Its main purpose is to parse binary ELF files and DWARF debugging information. This can be useful during malware analysis or troubleshooting issues with programs.

                Project details

                pyelftools is written in Python.

                Strengths and weaknesses

                • + More than 25 contributors
                • + More than 500 GitHub stars
                • + The source code of this software is available

                  Typical usage

                  • Binary analysis
                  • Malware analysis

                  pyelftools review

                  60

                  uncompyle6

                  Introduction

                  A decompiler like uncompyle6 can be used to investigate Python-based software components that are compiled. These files can be recognized by their .pyc file extension.

                  This tool has been written as several other decompilers were no longer maintained. So far this software seems to have a good number of contributors and regular updates.

                  Project details

                  Strengths and weaknesses

                  • + More than 10 contributors
                  • + The source code of this software is available

                    Typical usage

                    • Binary analysis
                    • Code analysis

                    uncompyle6 review

                    Some relevant tool missing as an alternative to Yosai? Please contact us with your suggestion.