About
Secure your code, cloud, and runtime in one central system.
Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes.
Teams get security done with Aikido thanks to:
- False-positive reduction
- AI Autotriage & AI Autofix
- Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating)
- AI Pentests
- Automated Compliance
Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
|
About
Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps.
|
About
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities.
ZeroPath provides complete security coverage:
1. AI-powered SAST for business logic flaws & broken authentication
2. SCA with reachability analysis
3. Secrets detection and validation
4. Infrastructure as Code
5. Automated patch generation.
any more...
ZeroPath delivers 2x more real vulnerabilities with 75% fewer false positives.
Our research team has been successful in finding vulns like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce.
Trusted by 750+ companies and performing 200k+ code scans monthly.
|
About
python-sql is a library to write SQL queries in a pythonic way. Simple selects, select with where condition. Select with join or select with multiple joins. Select with group_by and select with output name. Select with order_by, or select with sub-select. Select on other schema and insert query with default values. Insert query with values, and insert query with query. Update query with values. Update query with where condition. Update query with from the list. Delete query with where condition, and delete query with sub-query. Provides limit style, qmark style, and numeric style.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Development teams
|
Audience
Companies that need an advanced Application Security solution
|
Audience
Teams seeking a solution to enhance their application security processes without compromising development speed
|
Audience
Developers searching for a solution offering a library to write SQL queries
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
Free
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationAikido Security
Founded: 2022
Belgium
www.aikido.dev
|
Company InformationArmorCode
Founded: 2020
United States
www.armorcode.com
|
Company InformationZeroPath
Founded: 2024
United States
zeropath.com
|
Company InformationPython Software Foundation
United States
pypi.org/project/python-sql/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
|
|||||
|
|
||||||
|
|
||||||
CategoriesSecure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities fast & automatically. Aikido'sapplication security platform combines important scanning capabilities. SAST, DAST, SCA, CSPM, IaC, Container scanning and more - making it a true ASPM platform. Secure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities fast & automatically. Aikido's all-in-one approach combines multiple important scanning capabilities. SAST, DAST, SCA, CSPM, IaC, Container scanning and more - making it a true ASPM platform. Secure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities fast & automatically. Aikido’s DAST scanner shows where your app is most vulnerable so you can close security gaps before attackers find them. Monitor your App & APIs to find vulnerabilities like SQL injection, XSS, and CSRF — both on the surface and via authenticated DAST. Secure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities, Generate SBOMs and scan licenses. Many SBOM scanners will only scan for licenses inside of your repos. Aikido gives you full coverage by scanning your containers too. Secure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities fast & automatically. Aikido's all-in-one approach combines multiple important scanning capabilities. SAST, DAST, SCA, CSPM, IaC, Container scanning and more - making it a true ASPM platform. Secure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities fast & automatically. Aikido's all-in-one approach combines multiple important scanning capabilities. SAST, DAST, SCA, CSPM, IaC, Container scanning and more - making it a true ASPM platform. |
Categories |
Categories |
Categories |
|||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners Features
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
|
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Static Application Security Testing (SAST) Features
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Static Code Analysis Features
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Vulnerability Scanners Features
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
|
|||||
Integrations
Amazon Web Services (AWS)
Bamboo
Bugcrowd
C#
C++
ClickUp
Drone
GitLab
IntelliJ IDEA
Jenkins
|
Integrations
Amazon Web Services (AWS)
Bamboo
Bugcrowd
C#
C++
ClickUp
Drone
GitLab
IntelliJ IDEA
Jenkins
|
Integrations
Amazon Web Services (AWS)
Bamboo
Bugcrowd
C#
C++
ClickUp
Drone
GitLab
IntelliJ IDEA
Jenkins
|
Integrations
Amazon Web Services (AWS)
Bamboo
Bugcrowd
C#
C++
ClickUp
Drone
GitLab
IntelliJ IDEA
Jenkins
|
|||
|
|
|