Business Software for GitHub - Page 58

Top Software that integrates with GitHub as of August 2025 - Page 58

GitHub Clear Filters
  • 1
    Google Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.
  • 2
    Million.js

    Million.js

    Million.js

    Million.js introduces a novel "block" virtual DOM. It's significantly faster than React's virtual DOM, as it diffs data instead of the DOM. Million.js uses a custom compiler that automatically optimizes your React components on the server. Tired of learning new frameworks and big migrations? Million.js ships a drop-in automatic mode to make your React apps faster, without any code changes. We use a novel approach to the virtual DOM called the block virtual DOM. You can read more on what the block virtual DOM is with virtual DOM, back in block and how we make it happen in React with behind the block(). We are actively working on removing these limitations. It's also important to note that your application may not need Million.js – if your app is not UI heavy, you may not see much performance improvement.
  • 3
    Kindo

    Kindo

    Kindo

    Kindo is here and work will never be the same. With just a few clicks, connect to any AI model, integrate with your current apps, and offload your endless tasks with workflows. Kindo streamlines your work so you get to focus on the best parts of your job—not all that extra stuff. The first self-serve Al platform that connects OpenAI's ChatGPT, Google Bard, Cohere Claude or any preferred AI model to your company's data in a secure and private manner. Work efficiently with seamless Al search, connect up to 200+ SaaS integrations, and easily create no-code AI-powered workflows. Ask questions about your data and get answers within seconds, no more having to dig through spreadsheets or wikis—Kindo securely layers AI tools over your existing apps to tackle all your burning questions.
  • 4
    MettleCI

    MettleCI

    Data Migrators

    Reducing the time, cost, risk, uncertainty, and stress of DataStage delivery. Ensure all jobs comply with your coding standards, or use MettleCI's extensive library of best practices. Manage code in Git, directly from the DataStage Designer client, without any command line headaches. Promote your code from Development to Production using a fully-automated delivery pipeline. Give sequences the boot and allow MettleCI to build and run your job schedule automatically. Let MettleCI handle the heavy lifting of testing to ensure your builds are deployable without problems. No command lines, hacking, or complex config files. Test, build, and deploy using point-and-click.
  • 5
    Second State

    Second State

    Second State

    Fast, lightweight, portable, rust-powered, and OpenAI compatible. We work with cloud providers, especially edge cloud/CDN compute providers, to support microservices for web apps. Use cases include AI inference, database access, CRM, ecommerce, workflow management, and server-side rendering. We work with streaming frameworks and databases to support embedded serverless functions for data filtering and analytics. The serverless functions could be database UDFs. They could also be embedded in data ingest or query result streams. Take full advantage of the GPUs, write once, and run anywhere. Get started with the Llama 2 series of models on your own device in 5 minutes. Retrieval-argumented generation (RAG) is a very popular approach to building AI agents with external knowledge bases. Create an HTTP microservice for image classification. It runs YOLO and Mediapipe models at native GPU speed.
  • 6
    OpenZeppelin

    OpenZeppelin

    OpenZeppelin

    Summon our team of security experts to verify your system works as intended with the highest level of scrutiny. Track issues and resolutions, and interact directly with auditors for faster and more efficient communication. Automatic code analysis for differences, vulnerabilities, improvements, gas costs, and test runs. Powered by machine learning intelligence and state-of-the-art tools. Develop using security best practices, community-vetted libraries, and the most commonly adopted ERC standards. Test, execute, and verify deployments and upgrades across chains securely, with adding just 5 lines of code to your existing Hardhat (and soon Foundry) configuration. Gain full visibility into your smart contracts' risks and behaviors. Detect threats, get alerts on threats and anomalies, and automatically respond and resolve issues.
  • 7
    Threater

    Threater

    Threater

    Threater Enforce deploys and enforces data — in real time — at scale — across your entire network and blocks all known bad threat actors from ever entering your network. With full threat source attribution on every connection in your network, you are not only blocking all of the known bad threat actors at scale — but you’re arming your team with powerful insights about what is happening in your network — all in real time. Threater is a solution for managing and understanding all threats that blocks both inbound and outbound threats on your network. This service works with your existing security stack by blocking threat actors before they can even access your network. Threater has built-in support for most popular apps and common connectors, so you can maximize value and share data across all your tools.
  • 8
    Dazz

    Dazz

    Dazz

    Unified remediation for code, clouds, applications, and infrastructure. We help security and dev teams accelerate remediation and reduce exposure with one remediation solution for everything developed and run in their environments. Dazz connects security tools and pipelines, correlates insights from code to cloud, and shrinks alert backlog into root causes, so your team can remediate smarter and faster. Shrink your risk window from weeks to hours. Prioritize the vulnerabilities that matter most. Say goodbye to chasing and triaging alerts manually, and hello to automation that reduces exposure. We help security teams triage and prioritize critical fixes with context. Developers get insight into root causes and backlog relief. With less friction, your teams truly could become BFFs.
  • 9
    Opus Security

    Opus Security

    Opus Security

    Prioritize what really matters based on risk, contextual analysis, and event de-duplication. Manage the full remediation lifecycle and eliminate manual effort from the remediation process by introducing automation throughout. Drive cross-organizational initiatives with ease. Consolidate all your issues across posture management and vulnerability tools. Drastically reduce the number of issues by identifying common root causes, and get clear visibility and in-depth reporting. Effectively collaborate with distributed teams within their own tools. Deliver a personalized, relevant experience for every engineer. Provide actionable remediation guidance and practical code suggestions. Easily adapt to your own organizational structure. A centralized, unified platform designed to drive effective remediation across any attack surface, any tool, and any stakeholder. Easily integrating with existing posture management and vulnerability tools, Opus provides much-needed visibility.
  • 10
    Dryrun Security

    Dryrun Security

    DryRun Security

    DryRun Security has been built from our experience training 10,000+ developers and security professionals in application security testing and building security products at GitHub and Signal Sciences. From our experience, one thing is missing from all tools on the market today: security context for developers. Developers make code changes all day, every day. They need a security tool that provides security context to help them move faster and safer. Security code reviews often slow down the development team and happen too late in the development pipeline. Developers need security context right when a pull request is opened, so they can know the impact of the code change that's getting merged. Until now, most security testing has taken a generic approach that frustrates developers with repetitive alerts or inaccurate results.
  • 11
    Unified.to

    Unified.to

    Unified.to

    Ship the integrations your customers and prospects need now and watch your revenue soar, without compromising your core product. Deliver secure, deep and powerful integrations for all kinds of use cases with advanced observability and security features. We never store your customers' data, plus, you can even securely store your customers' OAUTH2 access tokens in your AWS Secrets Manager account. Keep your customers' credentials secure with OAUTH2 authentication while giving your customers full control to revoke access tokens anytime. Take charge of branding and security by using your OAUTH2 client IDS and secrets, giving your application full autonomy over authorization pages and access tokens. Skip the headache of juggling different APIs and complex data transformations. Simplify your integration process with one API and one data model.
    Starting Price: $250 per month
  • 12
    Daytona

    Daytona

    Daytona

    Daytona is the enterprise-grade GitHub Codespaces alternative for managing self-hosted, secure, and standardized development environments. Daytona supports dev containers and works with any IDE. You can self-host it on your own infrastructure and immediately benefit from high-density workspaces. Daytona ensures that development environments remain consistent and predictable throughout the DevOps lifecycle to boost developers' confidence in code deployment. Daytona enables team members and contractors to start contributing right away, reducing onboarding time and providing instant access to perfectly configured environments. Daytona scales with development requirements and removes constraints of local machines, providing computing power to handle any project size and complexity. Daytona allows developers to work on multiple projects by instantly running dev environments, including testing the same branch on multiple environments simultaneously.
  • 13
    Zipkin

    Zipkin

    Zipkin

    It helps gather timing data needed to troubleshoot latency problems in service architectures. Features include both the collection and lookup of this data. If you have a trace ID in a log file, you can jump directly to it. Otherwise, you can query based on attributes such as service, operation name, tags and duration. Some interesting data will be summarized for you, such as the percentage of time spent in a service, and whether or not operations failed. The Zipkin UI also presents a dependency diagram showing how many traced requests went through each application. This can help identify aggregate behavior including error paths or calls to deprecated services.
  • 14
    Compass

    Compass

    Atlassian

    Catalog everything, improve software health, and keep everyone in the flow with Atlassian’s Developer Experience Platform. Track all of your services and systems, improve your software health and engineering standards, and create a better developer experience with Compass Track software health metrics, apply security and health scorecards, and empower teams to improve their developer experience. Never get stuck searching during an incident. Quickly identify who owns a service and critical details including recent changes, dependencies, errors, and more. Easily track DORA, SPACE and DevEx metrics across teams and services to identify bottlenecks and improve your Developer Experience. Don’t get lost in the wilderness of repos, channels, or docs. Whether on-call or building a new service, reduce time spent searching with all of the details you need in one catalog.
  • 15
    SourceWhale

    SourceWhale

    SourceWhale

    Enhance your outreach with dynamic variables such as time of day, a fun fact or field of study, helping to deliver a highly personalized communication experience. Stand out in busy inboxes with some ‘out-of-the-box’ content that is unique to your target individual. Get creative with custom images, gifs, videos and more to inject some personality into your messages and stand out from your competitors. Create multistep outreach that combines channels like email, LinkedIn, phone calls, SMS and more. Not only will you tap into a wider audience with an integrated, tailored approach, but you’ll never miss an opportunity with automated follow-ups. Once live, outreach runs alongside day-to-day activities so you can refocus time on the more human parts of recruiting.
  • 16
    Quindar

    Quindar

    Quindar

    Monitor, control, and automate spacecraft operations. Operate multiple missions, diverse satellites, 
and various payloads within a unified interface. Control multiple satellite types in a single interface allowing for legacy fleet migration and next-gen payload support. Track spacecraft, reserve contacts, automate tasking, and intelligently respond to ground and space incidents with Quindar Mission Management. Harness the power of advanced analytics and machine learning to turn data into actionable intelligence. Make decisions faster via predictive maintenance, trend analysis, and anomaly detection. Leveraging data-driven insights that propel your mission forward. Built to integrate seamlessly with your existing systems and third-party applications. As your needs evolve, your operations can too without the constraint of vendor lock-in. Analyze flight paths and commands across most C2 systems.
  • 17
    Shakker

    Shakker

    Shakker

    With Shakker you can turn your imagination into images, in seconds. AI image generation doesn't have to be clunky when you use Shakker. Whether you want to create images, change styles, combine components, or paint any parts, Shakker makes it smoother than ever for you with prompt suggestions and precise designs. Shakker revolutionizes image creation, you can simply upload a reference photo, and it recommends styles from a library of vast images, making it easy to craft the perfect image. Beyond style transformation, Shakker offers advanced editing tools like segmentation, quick selection, and lasso for precise inpainting. Shakker.AI operates on sophisticated AI algorithms that analyze input and generate images accordingly. It interprets user commands or prompts to produce images that align with specified styles and themes. The underlying technology seamlessly blends AI's computational power with artistic creativity, delivering both unique and high-quality outputs.
  • 18
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 19
    Iteration

    Iteration

    Iteration

    Fast and powerful issue tracking, with embedded AI copilots that learn from your team's knowledge, so you can blaze through your tasks and ship world-class products faster. Uses your team’s docs and project history to better resolve design, development, and project management tasks. Instantly capture issues with screenshots, videos, and session logs from both web and mobile apps, in a format that developers will love. Fully documented issues in seconds, with suggested statuses and labels, advanced filters, and rich text descriptions.
    Starting Price: $10 per user per month
  • 20
    TruAnon

    TruAnon

    TruAnon

    TruAnon takes this a critical step further, it tabulates the depth of these interconnections and this rank/score makes you visibly trusted. Voluntary yet transparent verification shifts the burden of trust, naturally benefitting the credible. Regular users find pleasure in the process, engaging with the system that empowers them, while fraudsters find the economics of their tactics undone. The genius of this system lies in its simplicity, natural motivations safeguard the community and undermine the economic incentives of fraud. Results are immediate for any size community, fraudsters can't buy their way in, and the effort to sustain a fake presence is too costly to maintain in such a public way.
  • 21
    Anycode AI

    Anycode AI

    Anycode AI

    The only auto-pilot agent that works with your unique software development workflow. Anycode AI converts your whole Legacy codebase to modern tech stacks up to 8X faster. Boost your coding speed tenfold with Anycode AI. Utilize AI for rapid, compliant coding and testing. Modernize swiftly with Anycode AI. Effortlessly handle legacy code and embrace updates for efficient applications. Upgrade seamlessly from outdated systems. Our platform refines old logic for a smooth transition to advanced tech.
  • 22
    Coana

    Coana

    Socket

    Traditional SCA tools do not distinguish between exploitable and unexploitable vulnerabilities. As a consequence, up to 95% of the vulnerabilities that developers are remediating 'are irrelevant and can be safely ignored. Coana employs reachability analysis to eliminate up to 95% false positives. As a consequence, developers only need to remediate the remaining few vulnerabilities that are relevant. With up to 95% of vulnerabilities being unreachable, you save time and resources by focusing only on the remaining few that pose a real threat. Pinpoint the exact locations in your code affected by reachable vulnerabilities. See exactly which dependency updates are necessary to remediate reachable vulnerabilities. Identify reachable vulnerabilities in both direct and indirect dependencies.
    Starting Price: $20 per user per month
  • 23
    Devnaut

    Devnaut

    Devnaut

    Devnaut helps software developers visualize their architecture and codebase, speed up learning and onboarding, and create deeper collaboration and awareness. Quickly keep your architecture and codebase diagrams in sync with the current state of development allowing your diagrams and documentation to be fresh and relevant. Providing user training journeys to assist developers in onboarding. Enables developers to reduce time to productivity. Consolidate and display information relevant to the cross-functional team in the context of your application architecture. Allows the team to get the big picture and see the status of what is actually being developed. Devnaut gives users the tools to conceptualize their products and technologies by connecting components 
directly to resources like repositories, code directories, and data sources. Devnaut's collaborative platform integrates KPIs, real‑time codebase visibility, and quality metrics.
  • 24
    SURF Security

    SURF Security

    SURF Security

    Create a security air gap, reduce your attack surface and isolate your business from internal and external exploits, while streamlining SaaS apps and accessing your data. Grants access based on the identity of the users and their devices to any SaaS or on-prem apps. Isolated work environment from device and web threats locally on the endpoint, by encrypting, sandboxing and rendering content. Enforcing enterprise browser security policies like DLP, web filtering, phishing protection, extension management and more. SURF brings Zero-Trust principles to the user via the browser, protecting everyone and everything in the enterprise regardless of role. By configuring only a few policies, IT and security teams can significantly reduce the attack surface. Discover the benefits of utilizing SURF from an Information technology perspective.
  • 25
    RiskApp

    RiskApp

    RiskApp

    With RiskApp, you will have the ability to centralize your AppSec data sources, normalize them, and deduplicate the data. RiskApp then helps you understand your unique AppSec posture. Helping you to prioritize where to take action and set your custom RiskAppetite. RiskApp empowers organizations to centralize their application security data, bringing together fragmented tools and processes into a unified platform. Gain a single source of truth for your application security posture. Unlock the power of RiskApp's advanced analytics and insights. Understand and prioritize your application security comprehensively, from vulnerabilities to threat trends. Make data-driven decisions to fortify your defenses and stay ahead of emerging risks. RiskApp simplifies communication between teams via multiple collaboration tools as well as GRC. This enables the RiskApp platform to break barriers between developers and the security team.
  • 26
    Velma

    Velma

    Velma

    Automatically coordinate the whole company on product delivery with a superhuman project manager. Velma automatically tracks project health and flags risks for leaders - early. Our ML cuts through the noise and provides personalized updates so you don't have to rely on spreadsheets or meetings. She manages projects and sends updates and alerts directly through the tools you already use. Different workflows across teams? No problem! Velma's AI natively understands every workflow and rolls it up into a holistic and meaningful view, without any workflow changes from the team.
  • 27
    Longbow

    Longbow

    Longbow

    Longbow automates the analysis and correlation of issues from Application Security Testing (AST) tools, closing the gap between security teams and remediation teams and providing the best next actions to reduce the most risk with the least amount of investment. Longbow stands at the forefront of automatically analyzing and prioritizing security issues and remediation, from AST tools to VM, CNAPP tools, and more. Our product excels in identifying and addressing the root causes of security issues, offering tailored remediation solutions that can be immediately actioned. This capability is crucial in an industry inundated with disparate vendor ecosystems and a lack of clear direction for addressing security concerns. Our product is designed to empower security, application, and DevOps teams, enabling them to efficiently mitigate risks at scale. We seamlessly integrate, normalize, and unify cross-service contexts across all of your cloud security tools.
  • 28
    OpenContext

    OpenContext

    OpenContext

    OpenContext eliminates drift and provides the insight DevOps folks need to reduce toil. OpenContext unites all aspects of the socio-technical stack, connecting your code to artifacts in the cloud into a graph-based view. Our always-growing integration ecosystem tells the whole story of your tech stack. OpenContext discovers your socio-technical graph in real time, tracking the data lineage and best practices that ensure your team is audit-ready. We’ll show you exactly who has the relevant knowledge to address the problem, finding your fixer without all the extra effort. That means fewer interruptions, fewer contributors pulled off their regular work, and a much better use of your time and money. OpenContext auto-discovers your technical stack. You can’t afford to let those liabilities stay hidden. It leads to a real scramble to find the key people, your fixers, who know exactly how everything is put together.
  • 29
    Azure Static Web Apps
    Accelerate your app development with managed global availability for static content hosting and dynamic scale for integrated serverless APIs. Experience high productivity with a tailored local development experience, CI/CD workflows to build and deploy your app, and unified hosting and management in the cloud. Scale faster with fully managed global distribution of static content. Add managed Azure Front Door to your static web apps to significantly reduce latency and increase throughput for your global users with edge load balancing, SSL offload and application acceleration. Enrich your app with integrated serverless APIs powered by Azure Functions. Bring your content closer to your customers with automated content geo-distribution.
  • 30
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.