Skip to content

Commit e02924c

Browse files
committed
Change to machine-readable format
1 parent 03081e2 commit e02924c

40 files changed

+2588
-47
lines changed

Diff for: Makefile

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
.PHONY: render
2+
render:
3+
cargo run --manifest-path data/render/Cargo.toml -- --tags data/tags.yml --tools data/tools --out README.md

Diff for: README.md

+100-47
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
<!-- 🚨🚨 DON'T EDIT THIS FILE DIRECTLY. Edit `data/tools.yml` instead. 🚨🚨 -->
1+
<!-- 🚨🚨 DON'T EDIT THIS FILE DIRECTLY. Edit `data/tools/` instead. 🚨🚨 -->
22

3-
<a href="https://analysis-tools.dev/">
3+
<a href="http://analysis-tools.dev/">
44
<img width="400px" alt="Analysis Tools" src="https://raw.githubusercontent.com/analysis-tools-dev/website/master/static/logo.png" />
55
</a>
66

@@ -10,7 +10,6 @@ The official website, [analysis-tools.dev](https://analysis-tools.dev/) is based
1010
## What is Dynamic Analysis?
1111

1212
> Dynamic program analysis is the analysis of computer software that is performed by executing programs on a real or virtual processor. — [Wikipedia](https://en.wikipedia.org/wiki/Dynamic_program_analysis)
13-
1413
## Sponsors
1514

1615
This project would not be possible without the generous support of our sponsors.
@@ -26,80 +25,134 @@ This project would not be possible without the generous support of our sponsors.
2625

2726
If you also want to support this project, head over to our [Github sponsors page](https://github.com/sponsors/analysis-tools-dev).
2827

29-
## Meaning of Symbols:
28+
## Meaning of Symbols:
3029

3130
- :copyright: stands for proprietary software. All other tools are Open Source.
3231
- :information_source: indicates that the community does not recommend to use this tool for new projects anymore. The icon links to the discussion issue.
33-
- :warning: means that this tool was not updated for more than 6 months, or the repo was archived.
32+
- :warning: means that this tool was not updated for more than 1 year, or the repo was archived.
3433

3534
Pull requests are very welcome!
3635
Also check out the sister project, [awesome-static-analysis](https://github.com/mre/awesome-static-analysis).
3736

38-
## Binary
37+
## Table of Contents
38+
39+
#### [Programming Languages](#programming-languages-1)
40+
41+
<details>
42+
<summary>Show languages</summary>
43+
<!-- Please use HTML syntax here so that it works for Github and mkdocs -->
44+
<ul>
45+
<li><a href="#dotnet">.NET</a></li>
46+
<li><a href="#c">C</a></li>
47+
<li><a href="#cpp">C++</a></li>
48+
<li><a href="#java">Java</a></li>
49+
<li><a href="#javascript">JavaScript</a></li>
50+
<li><a href="#python">Python</a></li>
51+
<li><a href="#rust">Rust</a></li>
52+
<li><a href="#vbasic">Visual Basic</a></li>
53+
</ul>
54+
</details>
55+
56+
#### [Multiple languages](#multiple-languages-1)
57+
58+
#### [Other](#other-1)
59+
60+
- [Binaries](#binary)
61+
- [Containers](#container)
62+
- [Security](#security)
63+
64+
65+
---
66+
67+
## Programming Languages
68+
69+
<h2 id="dotnet">.NET</h2>
70+
71+
- [Microsoft IntelliTest](https://docs.microsoft.com/en-us/visualstudio/test/intellitest-manual/getting-started?view=vs-2019) - Generate a candidate suite of tests for your .NET code.
72+
- [Pex and Moles](https://www.microsoft.com/en-us/research/project/pex-and-moles-isolation-and-white-box-unit-testing-for-net/) - Pex automatically generates test suites with high code coverage using automated white box analysis.
73+
74+
75+
<h2 id="c">C</h2>
76+
77+
- [KLEE](https://github.com/klee/klee) - Symbolic virtual machine built on top of the LLVM compiler infrastructure.
78+
- [LDRA](https://ldra.com) :copyright: - A tool suite incuding dynamic analysis and test to various standards can ensure test coverage to 100% op-code, branch & decsion coverage.
79+
- [LLVM/Clang Sanitizers](https://github.com/google/sanitizers) - <ul> <li><a href="https://github.com/google/sanitizers/wiki/AddressSanitizer">AddressSanitizer</a> - A memory error detector for C/C++</li> <li><a href="https://github.com/google/sanitizers/wiki/MemorySanitizer">MemorySanitizer</a> - A detector of uninitialized memory reads in C/C++ programs.</li> <li><a href="https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual">ThreadSanitizer</a> - A data race detector for C/C++</li> </ul>
80+
- [tis-interpreter](https://github.com/TrustInSoft/tis-interpreter) - An interpreter for finding subtle bugs in programs written in standard C.
81+
- [Valgrind](http://valgrind.org/) - An instrumentation framework for building dynamic analysis tools.
82+
83+
84+
<h2 id="cpp">C++</h2>
3985

40-
* [angr](https://github.com/angr/angr) - Platform agnostic binary analysis framework from UCSB.
41-
* [TRITON](https://github.com/JonathanSalwan/Triton) - Dynamic Binary Analysis for x86 binaries.
42-
* [DynamoRIO](http://www.dynamorio.org/) - is a runtime code manipulation system that supports code transformations on any part of a program, while it executes.
43-
* [Pin Tools](https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool) - A dynamic binary instrumentation tool and a platform for creating analysis tools.
86+
- [KLEE](https://github.com/klee/klee) - Symbolic virtual machine built on top of the LLVM compiler infrastructure.
87+
- [LDRA](https://ldra.com) :copyright: - A tool suite incuding dynamic analysis and test to various standards can ensure test coverage to 100% op-code, branch & decsion coverage.
88+
- [LLVM/Clang Sanitizers](https://github.com/google/sanitizers) - <ul> <li><a href="https://github.com/google/sanitizers/wiki/AddressSanitizer">AddressSanitizer</a> - A memory error detector for C/C++</li> <li><a href="https://github.com/google/sanitizers/wiki/MemorySanitizer">MemorySanitizer</a> - A detector of uninitialized memory reads in C/C++ programs.</li> <li><a href="https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual">ThreadSanitizer</a> - A data race detector for C/C++</li> </ul>
89+
- [tis-interpreter](https://github.com/TrustInSoft/tis-interpreter) - An interpreter for finding subtle bugs in programs written in standard C.
90+
- [Valgrind](http://valgrind.org/) - An instrumentation framework for building dynamic analysis tools.
4491

45-
## Container
4692

47-
* [cadvisor](https://github.com/google/cadvisor) - Analyzes resource usage and performance characteristics of running containers.
93+
<h2 id="java">Java</h2>
4894

49-
## C/C++
95+
- [Java PathFinder](https://github.com/javapathfinder/jpf-core) - An extensible software model checking framework for Java bytecode programs.
96+
- [Parasoft Jtest](https://www.parasoft.com/products/jtest) :copyright: - Jtest is an automated Java software testing and static analysis product that is made by Parasoft. The product includes technology for Data-flow analysis Unit test-case generation and execution, static analysis, regression testing, code coverage, and runtime error detection.
5097

51-
* [KLEE](https://github.com/klee/klee) - Symbolic virtual machine built on top of the LLVM compiler infrastructure.
52-
* [tis-interpreter](https://github.com/TrustInSoft/tis-interpreter) - An interpreter for finding subtle bugs in programs written in standard C
53-
* [Valgrind](http://valgrind.org/) - An instrumentation framework for building dynamic analysis tools
54-
* [LDRA](https://ldra.com) :copyright: - a tool suite incuding dynamic analysis and test to various standards can ensure test coverage to 100% op-code, branch & decsion coverage.
55-
* [LLVM/Clang Sanitizers](https://github.com/google/sanitizers)
56-
- [AddressSanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizer) - A memory error detector for C/C++
57-
- [MemorySanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer) - A detector of uninitialized memory reads in C/C++ programs.
58-
- [ThreadSanitizer](https://github.com/google/sanitizers/wiki/ThreadSanitizerCppManual) - A data race detector for C/C++
5998

60-
## Java
99+
<h2 id="javascript">JavaScript</h2>
61100

62-
* [Java PathFinder](https://github.com/javapathfinder/jpf-core) - An extensible software model checking framework for Java bytecode programs.
63-
* [Parasoft Jtest](https://www.parasoft.com/products/jtest) :copyright: - Jtest is an automated Java software testing and static analysis product that is made by Parasoft. The product includes technology for Data-flow analysis Unit test-case generation and execution, static analysis, regression testing, code coverage, and runtime error detection.
101+
- [Iroh.js](https://github.com/maierfelix/Iroh) - A dynamic code analysis tool for JavaScript. Iroh allows to record your code flow in realtime, intercept runtime informations and manipulate program behaviour on the fly.
102+
- [Jalangi2](https://github.com/Samsung/jalangi2) - Jalangi2 is a popular framework for writing dynamic analyses for JavaScript.
64103

65-
## JavaScript
66104

67-
* [Iroh.js](https://github.com/maierfelix/Iroh) -A dynamic code analysis tool for JavaScript. Iroh allows to record your code flow in realtime, intercept runtime informations and manipulate program behaviour on the fly.
68-
* [Jalangi2](https://github.com/Samsung/jalangi2) - Jalangi2 is a popular framework for writing dynamic analyses for JavaScript.
105+
<h2 id="python">Python</h2>
69106

70-
## Python
107+
- [typo](https://github.com/aldanor/typo) - Runtime Type Checking for Python 3.
71108

72-
* [typo](https://github.com/aldanor/typo) - Runtime Type Checking for Python 3
73109

74-
## .NET
110+
<h2 id="rust">Rust</h2>
75111

76-
* [Microsoft IntelliTest](https://docs.microsoft.com/en-us/visualstudio/test/intellitest-manual/getting-started?view=vs-2019) - Generate a candidate suite of tests for your .NET code.
77-
* [Pex and Moles](https://www.microsoft.com/en-us/research/project/pex-and-moles-isolation-and-white-box-unit-testing-for-net/) - Pex automatically generates test suites with high code coverage using automated white box analysis.
112+
- [MIRI](https://github.com/rust-lang/miri) - An interpreter for Rust's mid-level intermediate representation, which can detect certain classes of undefined behavior like out-of-bounds memory accesses and use-after-free.
113+
- [puffin](https://github.com/EmbarkStudios/puffin) - Instrumentation profiler for Rust.
114+
- [stuck](https://github.com/jonhoo/stuck) - provides a visualization for quickly identifying common bottlenecks in running, asynchronous, and concurrent applications.
78115

79-
## Rust
80116

81-
* [MIRI](https://github.com/rust-lang/miri) - An interpreter for Rust's mid-level intermediate representation, which can detect certain classes of undefined behavior like out-of-bounds memory accesses and use-after-free.
82-
* [puffin](https://github.com/EmbarkStudios/puffin) - Instrumentation profiler for Rust.
83-
* [stuck](https://github.com/jonhoo/stuck) - provides a visualization for quickly identifying common bottlenecks in running, asynchronous, and concurrent applications.
117+
<h2 id="vbasic">Visual Basic</h2>
84118

85-
## Visual Basic
119+
- [VB Watch](https://www.aivosto.com/vbwatch.html) :copyright: - Profiler, Protector and Debugger for VB6. Profiler measures performance and test coverage. Protector implements robust error handling. Debugger helps monitor your executables.
86120

87-
* [VB Watch](https://www.aivosto.com/vbwatch.html) :copyright: - Profiler, Protector and Debugger for VB6. Profiler measures performance and test coverage. Protector implements robust error handling. Debugger helps monitor your executables.
88121

89122
## Multiple languages
90123

91-
* [AppScan Standard](https://www.hcltechsw.com/wps/portal/products/appscan/home/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8zi_QO8nQ0MnQ0C_F3MnA0CHX2dvYN9woxNvEz0w1EVWDgGuQAVeLpbBvu6Gxl4m-hHUaLfxJQ4_QY4gKMBifZjKojCb3y4fhSqFe6Bpk5AEwIMTNyMfYzdfczQFWAJIrwKQGFAyBUFuaGhoREGmZ7piooAwLgEZw!!/?1dmy&urile=wcm%3apath%3a/wps/wcm/connect/hcl+software+content/products/appscan/offerings/standard) :copyright: - HCL's AppScan is a dynamic application security testing suite ([previously by IBM](https://newsroom.ibm.com/2018-12-06-HCL-Technologies-to-Acquire-Select-IBM-Software-Products-for-1-8B)).
92-
* [Code Pulse](http://code-pulse.com/) - Code Pulse is a free real-time code coverage tool for penetration testing activities by OWASP and Code Dx ([GitHub](https://github.com/codedx/codepulse)).
93-
* [Dr. Memory](https://drmemory.org/) - Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors ([Github](https://github.com/DynamoRIO/drmemory)).
94-
* [Gcov](https://gcc.gnu.org/onlinedocs/gcc/Gcov.html) - GNU source code coverage program. Code coverage tool and profiling tool which is part of the GCC. Supports C, C++, Fortran.
95-
* [Minded Security BlueClosure](https://www.mindedsecurity.com/index.php/products/blueclosure) :copyright: - Dynamic web application security scanner. It uses dynamic data tainting in order to understand if a DOM XSS is exploitable and uses the browser JavaScript engine for understanding the code.
96-
* [WhiteHat Sentinel Dynamic](https://www.whitehatsec.com/products/dynamic-application-security-testing/) :copyright: - Part of the WhiteHat Application Security Platform. Dynamic application security scanner that covers the OWASP Top 10.
124+
- [Code Pulse](http://code-pulse.com/) - Code Pulse is a free real-time code coverage tool for penetration testing activities by OWASP and Code Dx ([GitHub](https://github.com/codedx/codepulse)).
125+
- [Gcov](https://gcc.gnu.org/onlinedocs/gcc/Gcov.html) - GNU source code coverage program. Code coverage tool and profiling tool which is part of the GCC. Supports C, C++, Fortran.
126+
- [WhiteHat Sentinel Dynamic](https://www.whitehatsec.com/products/dynamic-application-security-testing/) :copyright: - Part of the WhiteHat Application Security Platform. Dynamic application security scanner that covers the OWASP Top 10.
127+
128+
129+
## Other
130+
131+
132+
133+
<h2 id="binary">Binaries</h2>
134+
135+
- [angr](https://github.com/angr/angr) - Platform agnostic binary analysis framework from UCSB.
136+
- [Dr. Memory](https://drmemory.org/) - Dr. Memory is a memory monitoring tool capable of identifying memory-related programming errors ([Github](https://github.com/DynamoRIO/drmemory)).
137+
- [DynamoRIO](http://www.dynamorio.org/) - Is a runtime code manipulation system that supports code transformations on any part of a program, while it executes.
138+
- [Pin Tools](https://software.intel.com/en-us/articles/pin-a-dynamic-binary-instrumentation-tool) - A dynamic binary instrumentation tool and a platform for creating analysis tools.
139+
- [TRITON](https://triton.quarkslab.com/) - Dynamic Binary Analysis for x86 binaries.
140+
141+
142+
<h2 id="container">Containers</h2>
143+
144+
- [cadvisor](https://github.com/google/cadvisor) - Analyzes resource usage and performance characteristics of running containers.
145+
146+
147+
<h2 id="security">Security</h2>
148+
149+
- [AppScan Standard](https://www.hcltechsw.com/wps/portal/products/appscan/home/!ut/p/z1/04_Sj9CPykssy0xPLMnMz0vMAfIjo8zi_QO8nQ0MnQ0C_F3MnA0CHX2dvYN9woxNvEz0w1EVWDgGuQAVeLpbBvu6Gxl4m-hHUaLfxJQ4_QY4gKMBifZjKojCb3y4fhSqFe6Bpk5AEwIMTNyMfYzdfczQFWAJIrwKQGFAyBUFuaGhoREGmZ7piooAwLgEZw!!/?1dmy&urile=wcm%3apath%3a/wps/wcm/connect/hcl+software+content/products/appscan/offerings/standard) :copyright: - HCL's AppScan is a dynamic application security testing suite ([previously by IBM](https://newsroom.ibm.com/2018-12-06-HCL-Technologies-to-Acquire-Select-IBM-Software-Products-for-1-8B)).
150+
- [Minded Security BlueClosure](https://www.mindedsecurity.com/index.php/products/blueclosure) :copyright: - Dynamic web application security scanner. It uses dynamic data tainting in order to understand if a DOM XSS is exploitable and uses the browser JavaScript engine for understanding the code.
151+
97152

98153
## License
99154

100155
[![CC0](https://i.creativecommons.org/p/zero/1.0/88x31.png)](https://creativecommons.org/publicdomain/zero/1.0/)
101156

102157
To the extent possible under law, [Matthias Endler](https://endler.dev) has waived all copyright and related or neighboring rights to this work.
103-
104-
Logo [designed by Freepik](https://www.freepik.com/free-vector/programming-background-design_1033623.htm)
105-
158+
Title image [Designed by Freepik](http://www.freepik.com).

Diff for: data/.gitignore

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
/target/
2+
**/*.rs.bk
3+
.env

Diff for: data/README.md

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
This is the project's CI environment.
2+
Read more about the tooling [here](https://matthias-endler.de/2017/obsolete/).
3+
Want to add an entry to the list?
4+
Here's how to [contribute](https://github.com/analysis-tools-dev/static-analysis/blob/master/CONTRIBUTING.md).

Diff for: data/render/.gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
target

0 commit comments

Comments
 (0)