From 01e67d2bb0327c4c94e6b71b4ccf65586b5d7f55 Mon Sep 17 00:00:00 2001 From: ankitdn <153487192+ankitdn@users.noreply.github.com> Date: Mon, 2 Jun 2025 18:02:18 +0500 Subject: [PATCH] Added Vulert into README.md --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 8d59c0a..3bb293c 100644 --- a/README.md +++ b/README.md @@ -14,6 +14,7 @@ This document is intended to provide a list of tools used for vulnerability anal | [Several tools from PSU](http://siis.cse.psu.edu/tools.html) | Dare, Ded, Fortify SCA, Kirin and JLift | | [Smali CFG generator](https://github.com/EugenioDelfa/Smali-CFGs) | This tool generates Smali Control Flow Graphs which can facilitate the review process. | | [FlowDroid](https://blogs.uni-paderborn.de/sse/tools/flowdroid/) | FlowDroid is a context-, flow-, field-, object-sensitive and lifecycle-aware static taint analysis tool for Android applications. | +| [Vulert]( https://vulert.com/abom ) |Vulert helps developers secure their software by monitoring and alerting them to vulnerabilities in open-source dependencies—without requiring access to their code. It supports dependencies from Js, PHP, Java, Python, and many more.| | [PSCout](http://pscout.csl.toronto.edu/) | A tool that extracts the permission specification from the Android OS source code using static analysis | | [Amandroid](http://amandroid.sireum.org/) | Amandroid is a static analysis framework for Android apps. | | [SmaliSCA](https://github.com/dorneanu/smalisca) | Smali Static Code Analysis |