Alternatives to FOSSA

Compare FOSSA alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FOSSA in 2024. Compare features, ratings, user reviews, pricing, and more from FOSSA competitors and alternatives in order to make an informed decision for your business.

  • 1
    Kiuwan Code Security
    Security Solutions For Your DevOps Process. Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. Effective static application security testing and source code analysis, with affordable solutions for teams of all sizes. Kiuwan includes a variety of essential functionality in a single platform that can be integrated directly into your internal development infrastructure. Fast Vulnerability Detection: Easy and instant setup. Start scanning and get results in just minutes. DevOps Approach To Code Security: Integrate Kiuwan with your Ci/CD/DevOps pipeline to automate your security process. Flexible Licensing Options: Plenty of options, one time scans or continuous scanning. Kiuwan also offers a Saas or On-Premise model.
  • 2
    K.Explorer

    K.Explorer

    Morphis Tech

    A state-of-the-art AI that builds better software, cheaper and faster. K.Explorer is an AI powered Code Assistant trained on many millions of private corporate lines of code, for specific domains, and on billions of public and open-source lines of code for general purposes. Its code auto-completion features suggest code completions and entire function bodies as you type or as you search the engine for help. To make development faster and more agile it even supports Natural Language for programmers to get guidance while telling a text story about the code they want to write.
  • 3
    Kuscos

    Kuscos

    Morphis Tech

    Whether you are wanting to know what was added to that legacy Cobol system back in the 90s, or looking for advanced techniques to better manage your ongoing C# development project, Kuscos is the software intelligence platform of choice. For development teams, managers and executives, Kuscos delivers key information regarding source code modules and team members, from design documentation to dependencies, duplicate code and quality rule violations. Kuscos also provides oversight of team activities, from repository commits to issues resolved. Better still, the same platform does this across more than 16 legacy and modern software languages. As we pointed out in our earlier post, and according to the Standish Group, over the past 5 years only 29% of software projects could be described as successful (meeting time, budget and functionality goals). Improvements over time have been minimal despite increases in code development efficiencies and design processes
    Starting Price: $5000 per user, per year
  • 4
    Revenera SCA

    Revenera SCA

    Revenera

    Take control of your open source software management. Empower your organization to manage open source software (OSS) and third-party components. FlexNet Code Insight helps development, legal and security teams to reduce open source security risk and manage license compliance with an end-to-end system. FlexNet Code Insight is a single integrated solution for open source license compliance and security. Find vulnerabilities and remediate associated risk while you build your products and during their entire lifecycle. Manage open source license compliance, add automation to your processes, and implement a formal OSS strategy that balances business benefits and risk management. Integrate with build tools, CI/CD and SCM tools, artifact repositories, external repositories or build your own integrations using the FlexNet Code Insight REST API framework to make code scanning easy and effective.
  • 5
    Mend.io

    Mend.io

    Mend.io

    Trusted by the world's leading companies, including IBM, Google, and Capital One, Mend.io's enterprise suite of application security tools is designed to help you build and manage a mature, proactive AppSec program. Mend.io understands the different AppSec requirements of developers and security teams. Unlike other AppSec solutions that force everyone to use a single tool, Mend.io helps them work in harmony by giving each team different, but complementary, tools - enabling them to stop chasing vulnerabilities and start proactively managing application risk.
    Starting Price: $12,000 per year
  • 6
    Posit

    Posit

    Posit

    At Posit, our goal is to make data science more open, intuitive, accessible, and collaborative. We provide tools that make it easy for individuals, teams, and enterprises to leverage powerful analytics and gain the insights they need to make a lasting impact. From the beginning, we’ve invested in open-source software like the RStudio IDE, Shiny, and tidyverse. Because we believe in putting the power of data science tools in the hands of everyone. We develop R and Python-based tools to help you produce higher-quality analysis faster. Securely share data-science applications across your team and the enterprise. Our code is your code. Build on it. Share it. Improve people’s lives with it. Take the time and effort out of uploading, storing, accessing, and sharing your work. We love hearing about the amazing work being done with our tools around the world. And we really love sharing those stories.
  • 7
    Debricked

    Debricked

    Debricked

    Debricked's tool enables for increased use of Open Source while keeping associated risks at bay, making it possible to keep a high development speed while still staying secure. The service runs on state of the art machine learning, allowing the data quality to be outstanding as well as instantly updated. High precision (over 90% in supported languages) in combination with flawless UX and scalable automation features makes Debricked one of a kind and the way to go for open source management. Recently, debricked released their new platform by the name of Open Source Select where open source projects can be compared, evaluated and monitored to ensure high quality and community health.
  • 8
    FossID

    FossID

    FossID

    Software Composition Analysis (SCA) FossID Workbench enables precise identification of open source components and vulnerabilities. It integrates into software development cycles, providing license recognition, proactive security checks, and detailed compliance reporting. FossID Workbench is available across various industries and helps to ensure that organizations can confidently meet their legal, security, and operational needs in open source software management. Comprehensive Scanning Creates a thorough and complete software bill of materials (SBOM) that catalogs all open source in use, regardless of how it made its way into the codebase. Detailed Reporting Ensures distribution compliance by generating reports, notices files, and copyright statements. Integration & Extensibility Features custom workflows, performing administrative tasks, generating reports, and more with the API.
  • 9
    SCANOSS

    SCANOSS

    SCANOSS

    SCANOSS believes now is the time to reinvent Software Composition Analysis with a goal of ‘start left’ and a focus first on the foundation of reliable SCA, the SBOM. An SBOM that does not require a small army of auditors to make it usable. So, SCANOSS provides an SBOM that that is ‘always on’. SCANOSS released the first entirely Open Source SCA software platform for Open Source Inventorying, specifically designed for modern development (DevOps) environments. SCANOSS also released the first Open OSS Knowledge Base, free to the community. Our architecture is API-centric, built for developers. The “shift left” paradigm brings license compliance validation to the earliest possible stage in a development process. We can go as left as intercepting a CTRL-V in your IDE before undeclared Open Source is pasted. The first Open Source Inventorying engine built specifically for modern development and DevOps teams of all sizes.
    Starting Price: $0
  • 10
    BluBracket Code Security Suite
    The first comprehensive security solution for code in the enterprise. Software is more valuable than ever. It’s also more collaborative, open and complex—making it a threat to corporate security. BluBracket gives companies visibility into where source code introduces security risk while also enabling them to fully secure their code—without altering developer workflows or productivity. You can’t secure what you can’t see, and today’s collaborative coding tools equals code proliferation that companies have no visibility into. BluBracket gives companies a BluPrint of their code environments so they know where their code is and who has access to it, both inside and outside the organization. And most importantly, with one click you can classify the most important code, so you can show a detailed chain of custody for any audit or compliance needs.
    Starting Price: $2500 per month
  • 11
    Phylum

    Phylum

    Phylum

    Phylum is a security-as-code platform that gives security and risk teams more visibility into the code development lifecycle, and the ability to enforce security policy without disrupting innovation. Phylum analyzes open-source software packages as they are published and contextualizes the risks, protecting developers and applications at the perimeter of the open-source ecosystem and the tools used to build source code. The platform can be deployed on endpoints or plug directly into CI/CD pipelines so organizations experience seamless, always-on defense at the earliest stages of a build.
  • 12
    Xygeni

    Xygeni

    Xygeni Security

    Secure your Software Development and Delivery! Xygeni specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage security risks while minimizing noise and overwhelming alerts. Our innovative technologies automatically detect malicious code in real-time upon new and updated components publication, immediately notifying customers and quarantining affected components to prevent potential breaches. With extensive coverage spanning the entire Software Supply Chain—including Open Source components, CI/CD processes and infrastructure, Anomaly detection, Secret leakage, Infrastructure as Code (IaC), and Container security—Xygeni ensures robust protection for your software applications. Trust Xygeni Security to protect your operations and empower your team to build and deliver with integrity and security.
  • 13
    SOOS

    SOOS

    SOOS

    Industry-low pricing for SCA, DAST and SBOM management. SOOS SCA gives you everything you need in an SCA solution for one low price. SOOS DAST integrates into your build pipeline and consolidates DAST test results with SCA vulnerability scans in a single powerful web dashboard. Assembling a comprehensive SBOM from third party software or open source components is easy with SOOS SBOM Manager. Ingest, manage, and continually monitor third party SBOMs. Add SBOMs generated by your in house software developers using SOOS SCA. Use our API to access any of our 54M+ open source SBOMs. SOOS makes it easy to comply with government SBOM regulations and mandates.
    Starting Price: $0 per month
  • 14
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 15
    GitLab

    GitLab

    GitLab

    GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.
    Leader badge
    Starting Price: $29 per user per month
  • 16
    Insignary Clarity
    Insignary Clarity is a specialized software composition analysis solution that helps customers gain visibility into the binary code they use by identifying known, preventable security vulnerabilities, while also highlighting potential license compliance issues. It uses unique fingerprint-based technology, which works on the binary-level without the need for source code or reverse engineering. Unlike checksum and hash-based binary code scanners, which are constrained by limited databases of pre-compiled binaries of the most commonly used open source components, Clarity is independent of compile times and CPU architectures. This makes it easy for software developers, value added resellers, systems integrators and security MSPs overseeing software deployments to take proper, preventive action before product delivery. Insignary, the global leader in binary-level, open source software security and compliance, is a venture-backed startup, headquartered in South Korea.
  • 17
    ActiveState

    ActiveState

    ActiveState

    Protect your software supply chain with the ActiveState Platform. The only turn-key software supply chain that automates and secures importing, building & consuming open source. Available now for Python, Perl & Tcl. Our secure supply chain starts with modern package management that’s 100% compatible with the packages you use, highly-automated, and includes key enterprise features. Automated builds from source code, including linked C libraries. Per-package and per-version vulnerability flagging ensures you can automatically build/rebuild secure environments. A complete Bill of Materials (BOM) including provenance, licensing & all dependencies, including transient, OS & shared dependencies. Built-in virtual environments simplify development, debugging, testing and multi-project work. Web UI, API & CLI for Windows/Linux, with full macOS support soon. Spend less time wrestling with packages, dependencies, and vulnerabilities and more time focused on doing what you do best, coding!
    Starting Price: $167 per month
  • 18
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.
    Starting Price: $0
  • 19
    CAST SBOM Manager
    CAST SBOM Manager enables users to automatically create, customize, and maintain Software Bill of Materials (SBOMs) with the ultimate level of control and flexibility. It detects open source dependencies and related risks (vulnerabilities and security advisories, licenses, obsolescence) directly from scanning source code, and allows you to create and maintain SBOM metadata over time (proprietary components, custom licenses, vulnerabilities) and much more.
    Starting Price: Free
  • 20
    Arnica

    Arnica

    Arnica

    Put your software supply chain security on autopilot. Actively mitigate anomalies & risks in your development ecosystem, protect developers, and trust their code commits. Automate developer access management. Behavior-based developer access management with self-service provisioning in Slack or Teams. Continuously monitor and mitigate anomalous developer behavior. Identify hardcoded secrets. Validate and mitigate before they land in production. Go beyond SBOM and get visibility into all open-source licenses, infrastructure, vulnerabilities, and OpenSSF scorecards across your organization in minutes. Arnica is a behavior-based software supply chain security platform for DevOps. Arnica proactively protects your software supply chain by automating the day-to-day security operations and empowering developers to own security without incurring risks or compromising velocity. Arnica enables you to automate constant progress toward the least-privilege for developer permissions.
    Starting Price: Free
  • 21
    Black Duck

    Black Duck

    Synopsys

    For over 15 years, security, development, and legal teams around the globe have relied on Black Duck to help them manage the risks that come with the use of open source. Built on the Black Duck KnowledgeBase™—the most comprehensive database of open source component, vulnerability, and license information—Black Duck software composition analysis solutions and open source audits give you the insight you need to track the open source in your code, mitigate security and license compliance risks, and automatically enforce open source policies using your existing DevOps tools and processes. Black Duck provides a comprehensive software composition analysis (SCA) solution for managing security, quality, and license compliance risk that comes from the use of open source and third-party code in applications and containers. Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and throughout the application life cycle.
  • 22
    CAST Highlight
    CAST Highlight is a SaaS software intelligence product for performing rapid application portfolio analysis. It automatically analyzes source code of hundreds of applications in a week for Cloud Readiness, Software Composition Analysis (Open Source risks), Resiliency, and Technical Debt. Objective software insights from automated source code analysis combined with built-in qualitative surveys for business context enable more informed decision-making about application portfolios. CAST is the software intelligence category leader. CAST technology can see inside custom applications with MRI-like precision, automatically generating intelligence about their inner workings - composition, architecture, transaction flows, cloud readiness, structural flaws, legal and security risks. It’s becoming essential for faster modernization for cloud, raising the speed and efficiency of Software Engineering, better open source risk control, and accurate technical due diligence.
    Starting Price: $10K per year
  • 23
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • 24
    JFrog Platform
    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 25
    Bytesafe

    Bytesafe

    Bitfront

    Increase your open source security posture with automated best practices, with a unified workflow for security and developer teams. The cloud-native security platform reduces risk and protects revenue, without slowing down developers. The dependency firewall quarantines malicious open source before reaching developers and infrastructure, protecting data, assets, and company reputation. Our policy engine evaluates threat signals such as known vulnerabilities, license information, and customer-defined rules. Having insight into what open-source components are used in applications is crucial to avoid exploitable vulnerabilities. Software Composition Analysis (SCA) and dashboard reporting give stakeholders a holistic overview with immediate insights into the current situation. Discover when new open-source licenses are introduced in the codebase. Automatically track license compliance issues and restrict problematic or unlicensed packages.
    Starting Price: €1100 per month
  • 26
    SCM-Manager

    SCM-Manager

    Cloudogu GmbH

    The SCM-Manager offers full control over your source code and repository management for Git, Subversion and Mercurial. The SCM-Manager is a lightweight and flexible solution with a lot of benefits. The most important benefits are listed down below: - 100% open source under MIT license: SCM-Manager is free for commercial and personal use – regardless of the size of your team. - No unnecessary weight: The lean core of the SCM-Manager is fully focused on its core task: repository management. - Quickly extendable: Over 50 plugins add target-oriented new functions, e.g. for workflow-controlled code reviews. - Simple integration: Easily connect the SCM-Manager to existing systems (e.g. project management software or CI/CD pipelines). - Free platform choice: No matter if Linux, Windows, macOS or container - a convenient installer prepares your instance in no time. - Community Support: In the SCM-Manager Community forum at myCloudogu users can discuss problems or share their interests.
    Starting Price: 0€ and remains free afterwards
  • 27
    Nexus Intelligence
    The whole truth about open source risk. Alternative tools are prone to false positives and negatives because they scan apps “as declared” and trust developers to disclose the truth about dependencies embedded in software. Nexus scans apps “as deployed” utilizing Advanced Binary Fingerprinting (ABF). The result is a precise read on embedded dependencies and a Software Bill of Materials (SBOM) that reflects the truth about third-party risk. ABF identification utilizes cryptographic hash for binaries, structural similarity, derived coordinate, and file name. It can even identify renamed or modified components whether they were declared or not, misnamed, or added to the code base manually. The recent Octopus Scanner is a great example of why scanning the manifest is not "good enough" to identify malicious components being injected into our software supply chains.
  • 28
    Gogs

    Gogs

    Gogs

    The Gogs project aims to build a simple, stable, and extensible self-hosted Git service that can be set up in the most painless way. With Go, this can be done with an independent binary distribution across all platforms that Go supports. Simply run the binary for your platform. Or ship Gogs with Docker or Vagrant, or get it packaged. Gogs runs anywhere Go can compile for Windows, Mac, Linux, ARM, etc. Gogs has low minimal requirements and can run on an inexpensive Raspberry Pi. Some users even run Gogs instances on their NAS devices. Gogs is 100% open source and free of charge. All source code is available under the MIT License on GitHub. User dashboard, user profile, and activity timeline. Access repositories via SSH, HTTP, and HTTPS protocols. User, organization, and repository management. Repository and organization webhooks, including Slack, Discord, and Dingtalk. Repository Git hooks, deploy keys, and Git LFS. Repository issues, pull requests, wiki, and protected branches.
    Starting Price: Free
  • 29
    Backslash Security
    Ensure the security of your code and open sources. Identify externally reachable data flows and vulnerabilities for effective risk mitigation. By identifying genuine attack paths to reachable code, we enable you to fix only the code and open-source software that is truly in use and reachable. Avoid unnecessary overloading of development teams with irrelevant vulnerabilities. Prioritize risk mitigation efforts more effectively, ensuring a focused and efficient security approach. Reduce the noise CSPM, CNAPP, and other runtime tools create by removing unreachable packages before running your applications. Meticulously analyze your software components and dependencies, identifying any known vulnerabilities or outdated libraries that could pose a threat. Backslash analyzes both direct and transitive packages, ensuring 100% reachability coverage. It outperforms existing tools that solely focus on direct packages, accounting for only 11% of packages.
  • 30
    Socket

    Socket

    Socket

    Secure your supply chain. Ship with confidence. Socket fights vulnerabilities and provides visibility, defense-in-depth, and proactive supply chain protection for JavaScript and Python dependencies. Find and compare millions of open source packages. Socket is not a traditional vulnerability scanner. Socket proactively detects and blocks 70+ signals of supply chain risk in open source code, for comprehensive protection. Prevent compromised or hijacked packages from infiltrating your supply chain by monitoring changes to package.json and more in real-time. Socket is built by a team of prolific open source maintainers whose software is downloaded over 1 billion times per month. We understand how to build tools that developers love. But don’t take our word for it.
    Starting Price: $8 per user per month
  • 31
    DerScanner

    DerScanner

    DerSecur

    DerScanner is a convenient and easy-to-use officially CWE-Compatible solution that combines the capabilities of static (SAST), dynamic (DAST) and software composition analysis (SCA) in a single interface. It helps provide more thorough control over the security of applications and information systems and check both your own and open source code using one solution. Correlate the results of SAST and DAST, verify the detected vulnerabilities and eliminate them as a first priority. Strengthen your code by fixing vulnerabilities in both your own and third-party code. Perform an independent code review with developers-agnostic application analysis. Detect vulnerabilities and undocumented features in the code at all stages of the application development lifecycle. Control your in-house or third-party developers and secure legacy apps. Enhance user experience and feedback with a smoothly working and secure application.
    Starting Price: $500 USD
  • 32
    CycloneDX

    CycloneDX

    CycloneDX

    OWASP CycloneDX is a lightweight Software Bill of Materials (SBOM) standard designed for use in application security contexts and supply chain component analysis. Strategic direction and maintenance of the specification is managed by the CycloneDX Core working group, with origins in the OWASP community. A complete and accurate inventory of all first-party and third-party components is essential for risk identification. BOMs should ideally contain all direct and transitive components and the dependency relationships between them. Adopting CycloneDX allows organizations to quickly meet these minimum requirements and mature into using more sophisticated use cases over time. CycloneDX is capable of achieving all SBOM requirements defined in the OWASP Software Component Verification Standard (SCVS).
  • 33
    MergeBase

    MergeBase

    MergeBase

    With the lowest false positive software composition analysis (SCA) scanner, comprehensive software bill of materials (SBOM) engine, and patented Java Dynamic Application Hardening capability, MergeBase provides the only software supply chain security solution offering real-time DevSecOps visibility of third-party risk from development into operation covering all major languages from C/C++, .NET, JavaScript/NPM to Java.
    Starting Price: $380 per month
  • 34
    Rezilion

    Rezilion

    Rezilion

    Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis.
  • 35
    Assembla

    Assembla

    Idera

    Assembla is the most secure software development platform in the world. Get started in less than a minute, on-prem or in the cloud. Assembla SECUREGIT provides a fully supported and economical solution, on the infrastructure of your choice. Meet compliance requirements with the confidence that your data is protected. Assembla is your trusted partner on your journey to “what’s next.” Developers are not security engineers – they build code. And their code is typically 90% open source. Securing all that open source codes requires automation. Assembla SecureGit scans for secret key credentials and vulnerable component dependencies automatically, as developers commit code. Our operational playbook includes a bottom-up evaluation of the risks to security, risk mitigation techniques, and ongoing areas of investment to further reduce risks. Assembla is fully committed to GDPR with data centers in the EU.
    Starting Price: $7.50 per month
  • 36
    BitKeeper

    BitKeeper

    BitKeeper

    BitKeeper is the original distributed source management system. Now available as Open Source under the Apache 2.0 License. BitKeeper is a fast, enterprise-ready, distributed SCM that scales up to very large projects and down to tiny ones. Nested Repositories are submodules done right! Version control collections of repositories. Hybrid mode for binary files that uses a cloud of server for binaries instead of bloating the source repositories. All file accesses validate checksums for integrity. All file writes include redundancy for error correction. High performance and scales to very large repositories.
    Starting Price: Free
  • 37
    Crucible

    Crucible

    Atlassian

    Ship high quality code. Review code, discuss changes, share knowledge, and identify defects across SVN, Git, Mercurial, CVS, and Perforce. Create formal, workflow-based, or quick code reviews and assign reviewers from across your team. Turn any code review into a threaded discussion and comment on specific source lines, files, or an entire changeset. Take action on what's important with unified views into your code activity for commits, reviews, and comments. Improve code quality with data on which parts of your codebase have not been sufficiently reviewed. Get a quick view of review status and who might be holding up reviews. Access a complete audit trail with all code review details, down to the history of a specific review. Customize your Jira Software workflow to stop if there are any open reviews. Upgrade your workflow with Jira Software, Bitbucket Server, Bamboo and hundreds of other developer tools.
    Starting Price: $10 one-time payment
  • 38
    pgAdmin

    pgAdmin

    pgAdmin

    pgAdmin is a free software project released under the PostgreSQL/Artistic licence. The software is available in source and binary format from the PostgreSQL mirror network. Because compiling from source requires technical knowledge, we recommend installing binary packages whenever possible. pgAdmin is the most popular and feature rich Open Source administration and development platform for PostgreSQL, the most advanced Open Source database in the world. pgAdmin is a management tool for PostgreSQL and derivative relational databases such as EnterpriseDB's EDB Advanced Server. It may be run either as a web or desktop application. As pgAdmin is a web application, it can only interact with the local filesystem in ways that are allowed by modern web browsers. This limits what is possible for security; essentially files can only be "downloaded" or "uploaded" (through a form).
  • 39
    Sourcegraph

    Sourcegraph

    Sourcegraph

    Point Sourcegraph at the repositories you work with, stored in any code host, or search across the open source universe. Get answers quickly with literal, structural, and regular expression search, along with smart filters and Code Intelligence. Connect all your other tools to get things like test coverage, 1-click open file in editor, custom highlighting, and information from your other favorite services all in one place with extensions. Create living documentation with Markdown and live code queries to get engineers up to speed on unfamiliar code faster. Navigate through complex parts of your codebase or resolve incidents with collaborative and shareable notebooks. Embed notebooks anywhere you can embed HTML, like your own internal documentation, so you can spend less time updating stale docs. Search across every repository and code host to get to know the repository structure and learn from other developers' code.
    Starting Price: $25 per user per month
  • 40
    SonarCloud

    SonarCloud

    SonarSource

    Maximize your throughput and only release clean code SonarCloud automatically analyzes branches and decorates pull requests. Catch tricky bugs to prevent undefined behavior from impacting end-users. Fix vulnerabilities that compromise your app, and learn AppSec along the way with Security Hotspots. With just a few clicks you're up and running right where your code lives. Immediate access to the latest features and enhancements. Project dashboards keep teams and stakeholders informed on code quality and releasability. Display project badges and show your communities you're all about awesome. Code Quality and Code Security is a concern for your entire stack, from front-end to back-end. That’s why we cover 24 languages including Python, Java, C++, and many others. Transparency makes sense and that's why the trend is growing. Come join the fun, it's entirely free for open-source projects!
    Starting Price: €10 per month
  • 41
    Codecov

    Codecov

    Codecov

    Develop healthier code. Improve your code review workflow and quality. Codecov provides highly integrated tools to group, merge, archive, and compare coverage reports. Free for open source. Plans starting at $10/user per month. Ruby, Python, C++, Javascript, and more. Plug and play into any CI product and workflow. No setup required. Automatic report merging for all CI and languages into a single report. Get custom statuses on any group of coverage metrics. Review coverage reports by project, folder and type test (unit tests vs integration tests). Detailed report commented directly into your pull request. Codecov is SOC 2 Type II certified, which means a third-party audits and attests to our practices to secure our systems and your data.
    Starting Price: $10 per user per month
  • 42
    SpectralOps

    SpectralOps

    Spectral Cyber Technologies

    Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Map and monitor hidden sensitive assets such as codebases, logs, and other sensitive intellectual property that belong to your organization, but were left exposed in public facing repositories. Leverage SpectralOps’ advanced AI backed technology with over 2000 detectors to get extensive coverage, detect issues and keep your organization safe.
  • 43
    HCL VersionVault

    HCL VersionVault

    HCL Software

    HCL VersionVault can help organizations by balancing flexibility with the organization’s need for control. It provides controlled access to soft assets, including code, requirements, design documents, models, schematics, test plans, and test results. User authentication and authoritative audit trails help your organization meet compliance requirements with minimal administrative hassle for you. With access virtually anytime, anywhere, HCL VersionVault gives you the freedom to work efficiently where and when you need it. Whether your team is a small workgroup at a single location or a highly-distributed team spanning multiple geographies, HCL VersionVault provides the scalability needed for your organizational needs. Maintain flexibility with Integrated Development Environment (IDE) extensions, open-source and third-party tools, cross-platform support, remote access and disconnected/offline usage.
  • 44
    Repositery

    Repositery

    Repositery

    SVN, Mercurial and Git cloud hosting with Trac project management. Startup or multinational, whenever you run a project requiring several programmers, version control is a must-have. Repositery is a one-stop cloud solution for your SVN, Mercurial and Git repository requirements. Repositery is packed with features to help you manage your code and your project with ease. Repositery offers fast and reliable hosting for Git, Mercurial and Subversion repositories. Mix and match unlimited repositories of any type per project. Git is the most famous version control system and you get unlimited git repos at Repositery. Repositery offers SVN hosting which is used by many entities around the world. Mercurial is a distributed revision control tool for software developers which is available at Repositery. Trac is an open-source, Web-based project management and bug tracking system.
    Starting Price: $3 per month
  • 45
    Visual Studio Code
    VSCode: Code editing. Redefined. Free. Built on open source. Runs everywhere. Go beyond syntax highlighting and autocomplete with IntelliSense, which provides smart completions based on variable types, function definitions, and imported modules. Debug code right from the editor. Launch or attach to your running apps and debug with break points, call stacks, and an interactive console. Working with Git and other SCM providers has never been easier. Review diffs, stage files, and make commits right from the editor. Push and pull from any hosted SCM service. Want even more features? Install extensions to add new languages, themes, debuggers, and to connect to additional services. Extensions run in separate processes, ensuring they won't slow down your editor. Learn more about extensions. With Microsoft Azure you can deploy and host your React, Angular, Vue, Node, Python (and more!) sites, store and query relational and document based data, and scale with serverless computing.
  • 46
    Stacklok

    Stacklok

    Stacklok

    Software is eating the world. Hostile, sophisticated actors will ultimately eat the software industry if left unchecked. We build open source software that developers love, which in turn makes the world a safer place for all. From developers workflow to a running workload, end-to-end provenance and insight Software supply chain vulnerabilities are not a new phenomenon. Whether it is open source or proprietary software, some of the most significant exploitations in the history of software can be traced back to the software supply chain.
  • 47
    Kusari

    Kusari

    Kusari

    Kusari’s platform offers "always-on transparency” for the visibility and insights you need. Secure your software development lifecycle end-to-end, powered by open source GUAC and open standards. Understand the composition of any software artifact with GUAC, a queryable open-source knowledge graph. Evaluate artifacts before you ingest them, and create policies to automatically prevent risky or vulnerable dependencies from entering your supply chain. Make your development process secure by default without interrupting developer workflows. Kusari meets you where you are by integrating with your existing IDE and CI/CD tools. Put software supply chain security best practices on autopilot, ensuring the integrity of each build and generating the metadata to prove it.
  • 48
    Deepbits

    Deepbits

    Deepbits Technology

    Deepbits Platform, built on years of top-notch academic research, generates software bill of materials (SBOMs) directly from application binaries to firmware images and continuously protects digital assets by integrating itself into the software supply chain lifecycle. - without accessing any source code
    Starting Price: $0
  • 49
    Chainguard

    Chainguard

    Chainguard

    Out-of-date software is a major factor in security breaches. Our images are continuously updated with new versions and fixes. Our images come with SLAs that guarantee that we will provide patches or mitigations for vulnerabilities within an agreed time frame. Our images aim for zero-known vulnerabilities. No more spending hours analyzing reports from scanning tools. Our team has a deep understanding of the entire problem space, creating some of the most successful foundational open source projects in this domain. We know that automation, without sacrificing developer productivity, is key. Enforce generates a real-time asset inventory database to power developer tooling, incident recovery, and audit automation. Enforce can be used to generate SBOMs, monitor running containers for CVEs, and protect infrastructure against insider attacks.
  • 50
    Fianu

    Fianu

    Fianu

    Fianu monitors activity throughout your DevOps toolchain and generates an immutable, context-aware ledger of attestations that tells the story of your software leading up to production. Capture key security data points using pre-built integrations with your favorite security tools. Monitor and enforce best practices such as code review, branching strategy, and versioning scheme. Ensure software meets necessary functional, performance, and accessibility standards. Create or configure custom controls to meet the unique needs of your company. Out-of-the-box tooling to help you secure your software supply chain from development, to build, to deployment. Configurable control requirements and thresholds provide executives, managers, and stakeholders with the knobs and dials necessary to fine-tune compliance to your company's needs.