Alternatives to LLMFuzzer

Compare LLMFuzzer alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to LLMFuzzer in 2026. Compare features, ratings, user reviews, pricing, and more from LLMFuzzer competitors and alternatives in order to make an informed decision for your business.

  • 1
    Aikido Security

    Aikido Security

    Aikido Security

    Secure your code, cloud, and runtime in one central system. Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes. Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Compare vs. LLMFuzzer View Software
    Visit Website
  • 2
    Awesome Fuzzing
    Awesome Fuzzing is a list of fuzzing resources including books, courses, both free and paid, videos, tools, tutorials, and vulnerable applications to practice in order to learn fuzzing and initial phases of exploit development like root cause analysis. Courses/training videos on fuzzing, videos talking about fuzzing techniques, tools, and best practices. Conference talks and tutorials, blogs, tools that help in fuzzing applications, and fuzzers that help in fuzzing applications that use network-based protocols like HTTP, SSH, SMTP, etc. Search and pick the exploits, that have respective apps available for download, and reproduce the exploit by using the fuzzer of your choice. Set of tests for fuzzing engines. Includes different well-known bugs. A corpus, including various file formats for fuzzing multiple targets in the fuzzing literature.
  • 3
    ServerSage

    ServerSage

    ServerSage.ai

    ServerSage is an AI platform that performs the complete pentesting workflow—planning reconnaissance, probing systems, executing attacks, and documenting findings—just like a human red team. Built for security professionals who need to scale their testing capabilities, it handles the heavy lifting: repetitive reconnaissance, vulnerability validation, exploit execution, and comprehensive reporting. Your team makes strategic decisions while ServerSage delivers technical execution and documentation.
  • 4
    BlackArch Fuzzer
    BlackArch is a Linux pentesting distribution based on ArchLinux. BlackArch Fuzzer provides packages that use the fuzz testing principle.
  • 5
    CyStack Platform

    CyStack Platform

    CyStack Security

    WS provides the ability to scan web apps from outside the firewall, giving you an attacker's perspective; helps detect OWASP Top 10 and known vulnerabilities and constantly monitoring your IPs for other security threats. The team of CyStack pen-testers conducts hypothetical attacks on a customer's applications to discover security weaknesses that could expose applications to cyberattack. As a result, the technical team can fix those vulnerabilities before hackers find and exploit them. Crowdsourced Pen-test is the combination of certified experts and community of researchers. CyStack deploys, operates, and manages the Bug Bounty program on behalf of enterprises to attract a community of experts to find vulnerabilities in technology products such as Web, Mobile, Desktop applications, APIs or IoT devices. This service is a perfect solution for companies that are interested in the Bug Bounty model.
  • 6
    API Fuzzer

    API Fuzzer

    Fuzzapi

    API Fuzzer allows to fuzz-request attributes using common pentesting techniques and lists vulnerabilities. API Fuzzer gem accepts an API request as input and returns vulnerabilities possible in the API. Cross-site scripting vulnerability, SQL injection, blind SQL injection, XML external entity vulnerability, IDOR, API rate limiting, open redirect vulnerabilities, information disclosure flaws, info leakage through headers, and cross-site request forgery vulnerability.
  • 7
    PentesterLab

    PentesterLab

    PentesterLab

    We make learning web hacking easier! Our exercises cover everything from basic bugs to advanced vulnerabilities. Not only will we help you learn but you'll also have fun doing it! There's only one way to properly learn web penetration testing: by getting your hands dirty. We teach how to manually find and exploit vulnerabilities. Our exercises are based on common vulnerabilities found in different systems. The issues are not emulated, we provide you with real systems with real vulnerabilities. Our online exercises allow you to obtain certificates of completion. Exercises are grouped into badges that you can complete to get your certificate. It allows you to easily demonstrate your knowledge and skills. With PentesterLab PRO, you can learn when you want, where you want. We provide courses to get you started as well as videos if you get stuck. PentesterLab will get you to the next level.
    Starting Price: $19.99 per month
  • 8
    StartKit.AI

    StartKit.AI

    Squarecat.OÜ

    StartKit.AI is a boilerplate designed to speed up the development of AI projects. It offers pre-built REST API routes for all common AI tasks: chat, images, long-form text, speech-to-text, text-to-speech, translations, and moderation. As well as more complex integrations, such as RAG, web-crawling, vector embeddings, and much more! It also comes with user management and API limit management features, along with fully detailed documentation covering all the provided code. Upon purchase, customers receive access to the complete StartKit.AI GitHub repository where they can download, customize, and receive updates on the full code base. 6 demo apps are included in the code base, providing examples on how to create your own ChatGPT clone, PDF analysis tool, blog-post creator, and more. The ideal starting off point for building your own app!
  • 9
    NeuReality

    NeuReality

    NeuReality

    NeuReality accelerates the possibilities of AI by offering a revolutionary solution that lowers the overall complexity, cost, and power consumption. While other companies also develop Deep Learning Accelerators (DLAs) for deployment, no other company connects the dots with a software platform purpose-built to help manage specific hardware infrastructure. NeuReality is the only company that bridges the gap between the infrastructure where AI inference runs and the MLOps ecosystem. NeuReality has developed a new architecture design to exploit the power of DLAs. This architecture enables inference through hardware with AI-over-fabric, an AI hypervisor, and AI-pipeline offload.
  • 10
    Llama Stack
    Llama Stack is a modular framework designed to streamline the development of applications powered by Meta's Llama language models. It offers a client-server architecture with flexible configurations, allowing developers to mix and match various providers for components such as inference, memory, agents, telemetry, and evaluations. The framework includes pre-configured distributions tailored for different deployment scenarios, enabling seamless transitions from local development to production environments. Developers can interact with the Llama Stack server using client SDKs available in multiple programming languages, including Python, Node.js, Swift, and Kotlin. Comprehensive documentation and example applications are provided to assist users in building and deploying Llama-based applications efficiently.
  • 11
    BenchLLM

    BenchLLM

    BenchLLM

    Use BenchLLM to evaluate your code on the fly. Build test suites for your models and generate quality reports. Choose between automated, interactive or custom evaluation strategies. We are a team of engineers who love building AI products. We don't want to compromise between the power and flexibility of AI and predictable results. We have built the open and flexible LLM evaluation tool that we have always wished we had. Run and evaluate models with simple and elegant CLI commands. Use the CLI as a testing tool for your CI/CD pipeline. Monitor models performance and detect regressions in production. Test your code on the fly. BenchLLM supports OpenAI, Langchain, and any other API out of the box. Use multiple evaluation strategies and visualize insightful reports.
  • 12
    Peach Fuzzer

    Peach Fuzzer

    Peach Tech

    Peach is a SmartFuzzer that is capable of performing both generation and mutation-based fuzzing. Peach requires the creation of Peach Pit files that define the structure, type information, and relationships in the data to be fuzzed. It additionally allows for the configuration of a fuzzing run including selecting a data transport (publisher), logging interface, etc. Peach has been under active development since 2004 and is in its third major version. Fuzzing continues to be the fastest way to find security issues and test for bugs. Effective hardware fuzzing with Peach will introduce students to the fundamentals of device fuzzing. Peach was designed to fuzz any type of data consumer from servers to embedded devices. Researchers, corporations, and governments already use Peach to find vulnerabilities in hardware. This course will focus on using Peach to target embedded devices and collect information from the device in the event of a crash.
  • 13
    Mayhem

    Mayhem

    ForAllSecure

    Advanced fuzzing solution that combines guided fuzzing with symbolic execution, a patented technology from CMU. Mayhem is an advanced fuzz testing solution that dramatically reduces manual testing efforts with autonomous defect detection and validation. Deliver safe, secure, reliable software with less time, cost, and effort. Mayhem’s unique advantage is in its ability to acquire intelligence of its targets over time. As Mayhem’s knowledge grows, it deepens its analysis and maximizes its code coverage. All reported vulnerabilities are exploitable, confirmed risks. Mayhem guides remediation efforts with in-depth system level information, such as backtraces, memory logs, and register state, expediting issue diagnosis and fixes. Mayhem utilizes target feedback to custom generate test cases on the fly -- meaning no manual test case generation required. Mayhem offers access to all of its test cases to make regression testing effortless and continuous.
  • 14
    PurpleLeaf

    PurpleLeaf

    PurpleLeaf

    PurpleLeaf is a better penetration test that covers your organization continuously. Purpleleaf is a platform powered by passionate, research-focused, penetration testers. We scope the size and complexity of your application or infrastructure. We provide a quote for the testing (just as you would a traditional annual pentest). Within 1 – 2 weeks your pentest report will be available. Periodic testing continues throughout the year and will receive monthly reports as well as notifications for new vulnerabilities, assets, and applications discovered. A traditional pentest can leave you vulnerable for 11 months of the year. Our testing is performed throughout the year. PurpleLeaf allows for even a small number of hours to provide coverage for longer periods of time. With our model, you only pay for what you need. Most pentest reports fail to show what your attack surface really looks like. In addition to showing vulnerabilities, we visualize applications, show dangerous services, etc.
  • 15
    Reconmap

    Reconmap

    Netfoe

    Take your pentesting projects to the next level with a collaboration tool that streamline your entire process. Reconmap is a powerful, browser-based collaboration platform for penetration testing that helps infosec teams through the use of automation and reporting. Generate complete pentest reports with Reconmap's templates; save time and effort. Command automators allow you to execute multiple commands with any or little manual intervention. Automatically generate a report with the command findings. Analyze data on pentests, vulnerabilities, and projects to make informed decisions on their management. Find out how much time is spent on different tasks with our dashboard.
  • 16
    Delineate

    Delineate

    Delineate

    Delineate offers an easy-to-use platform for generating machine learning-driven predictive models for a range of purposes. Enrich your CRM data with churn predictions, sales forecasts, and even build data products for your customers and team, just to name a few. With Delineate you can access data-driven insights to improve decision-making with ease. The platform caters to founders, revenue teams, product managers, executives, and data enthusiasts. Try Delineate and unleash your data's full potential.
    Starting Price: $99 per month
  • 17
    FuzzDB

    FuzzDB

    FuzzDB

    FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses. FuzzDB contains comprehensive lists of attack payload primitives for fault injection testing. These patterns, categorized by the attack and where appropriate platform type, are known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, HTTP header crlf injections, SQL injection, NoSQL injection, and more. For example, FuzzDB catalogs 56 patterns that can potentially be interpreted as a null byte and contains lists of commonly used methods and name-value pairs that trigger debug modes.
  • 18
    Echidna

    Echidna

    Crytic

    Echidna is a Haskell program designed for fuzzing/property-based testing of Ethereum smart contracts. It uses sophisticated grammar-based fuzzing campaigns based on a contract ABI to falsify user-defined predicates or Solidity assertions. We designed Echidna with modularity in mind, so it can be easily extended to include new mutations or test specific contracts in specific cases. Generates inputs tailored to your actual code. Optional corpus collection, mutation and coverage guidance to find deeper bugs. Powered by Slither to extract useful information before the fuzzing campaign. Source code integration to identify which lines are covered after the fuzzing campaign. Interactive terminal UI, text-only or JSON output. Automatic test case minimization for quick triage. Seamless integration into the development workflow. Maximum gas usage reporting of the fuzzing campaign. Support for a complex contract initialization with Etheno and Truffle.
  • 19
    Grammatech Proteus
    Proteus is an advanced software testing system for automatically finding and fixing vulnerabilities, with no false alarms, aimed at development groups, testing organizations, and cybersecurity teams. It discovers vulnerabilities that could be triggered by potentially malicious files or network inputs, including many common entries in the Common Weakness Enumeration (CWE). The tool supports Windows and Linux native binaries. By integrating and simplifying the use of state-of-the-art tools for binary analysis and transformation, Proteus lowers the costs and increases the efficiency and effectiveness of software testing, reverse engineering, and maintenance. Binary analysis, mutational fuzzing, and symbolic execution without the need for source code, and a professional-grade user interface for result aggregation and presentation. Advanced exploitability reporting and reasoning capability, and deployment in a virtualized environment or on a host system.
  • 20
    PyTorch

    PyTorch

    PyTorch

    Transition seamlessly between eager and graph modes with TorchScript, and accelerate the path to production with TorchServe. Scalable distributed training and performance optimization in research and production is enabled by the torch-distributed backend. A rich ecosystem of tools and libraries extends PyTorch and supports development in computer vision, NLP and more. PyTorch is well supported on major cloud platforms, providing frictionless development and easy scaling. Select your preferences and run the install command. Stable represents the most currently tested and supported version of PyTorch. This should be suitable for many users. Preview is available if you want the latest, not fully tested and supported, 1.10 builds that are generated nightly. Please ensure that you have met the prerequisites (e.g., numpy), depending on your package manager. Anaconda is our recommended package manager since it installs all dependencies.
  • 21
    OpenVINO
    The Intel® Distribution of OpenVINO™ toolkit is an open-source AI development toolkit that accelerates inference across Intel hardware platforms. Designed to streamline AI workflows, it allows developers to deploy optimized deep learning models for computer vision, generative AI, and large language models (LLMs). With built-in tools for model optimization, the platform ensures high throughput and lower latency, reducing model footprint without compromising accuracy. OpenVINO™ is perfect for developers looking to deploy AI across a range of environments, from edge devices to cloud servers, ensuring scalability and performance across Intel architectures.
  • 22
    Xilinx

    Xilinx

    Xilinx

    The Xilinx’s AI development platform for AI inference on Xilinx hardware platforms consists of optimized IP, tools, libraries, models, and example designs. It is designed with high efficiency and ease-of-use in mind, unleashing the full potential of AI acceleration on Xilinx FPGA and ACAP. Supports mainstream frameworks and the latest models capable of diverse deep learning tasks. Provides a comprehensive set of pre-optimized models that are ready to deploy on Xilinx devices. You can find the closest model and start re-training for your applications! Provides a powerful open source quantizer that supports pruned and unpruned model quantization, calibration, and fine tuning. The AI profiler provides layer by layer analysis to help with bottlenecks. The AI library offers open source high-level C++ and Python APIs for maximum portability from edge to cloud. Efficient and scalable IP cores can be customized to meet your needs of many different applications.
  • 23
    Google ClusterFuzz
    ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software. Google uses ClusterFuzz to fuzz all Google products and as the fuzzing backend for OSS-Fuzz. ClusterFuzz provides many features to seamlessly integrate fuzzing into a software project’s development process. Fully automatic bug filing, triage, and closing for various issue trackers. Supports multiple coverages guided fuzzing engines for optimal results (with ensemble fuzzing and fuzzing strategies). Statistics for analyzing fuzzer performance, and crash rates. Easy to use web interface for management and viewing crashes. Support for various authentication providers using Firebase. Support for black-box fuzzing, test case minimization, and regression finding through bisection.
  • 24
    ClusterFuzz
    ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software. Google uses ClusterFuzz to fuzz all Google products and as the fuzzing backend for OSS-Fuzz. ClusterFuzz provides many features to seamlessly integrate fuzzing into a software project’s development process. Fully automatic bug filing, triage, and closing for various issue trackers. Supports multiple coverages guided fuzzing engines for optimal results (with ensemble fuzzing and fuzzing strategies). Statistics for analyzing fuzzer performance, and crash rates. Easy to use web interface for management and viewing crashes. Support for various authentication providers using Firebase. Support for black-box fuzzing, test case minimization, and regression finding through bisection.
  • 25
    TABS

    TABS

    TABS

    TabStack is a web-data API designed to empower AI agents and automation workflows to interact with the live web; it enables users to extract structured content from any URL (HTML, Markdown, JSON), transform raw web pages into usable formats (for example converting product listings into comparison tables or blog posts into social-ready snippets), perform complex browser-style automations (clicking, scrolling, submitting forms) and run deep research queries that surface insights and summaries across hundreds of sources. It is built for production-scale reliability and low latency, optimizing fetches by parsing only what’s necessary and escalating to full-page rendering only when needed, and features built-in resilience (automatic retries, adaptation to flaky HTML) to ensure robustness in real-world web environments.
  • 26
    Entry Point AI

    Entry Point AI

    Entry Point AI

    Entry Point AI is the modern AI optimization platform for proprietary and open source language models. Manage prompts, fine-tunes, and evals all in one place. When you reach the limits of prompt engineering, it’s time to fine-tune a model, and we make it easy. Fine-tuning is showing a model how to behave, not telling. It works together with prompt engineering and retrieval-augmented generation (RAG) to leverage the full potential of AI models. Fine-tuning can help you to get better quality from your prompts. Think of it like an upgrade to few-shot learning that bakes the examples into the model itself. For simpler tasks, you can train a lighter model to perform at or above the level of a higher-quality model, greatly reducing latency and cost. Train your model not to respond in certain ways to users, for safety, to protect your brand, and to get the formatting right. Cover edge cases and steer model behavior by adding examples to your dataset.
    Starting Price: $49 per month
  • 27
    Fuzzbuzz

    Fuzzbuzz

    Fuzzbuzz

    The Fuzzbuzz workflow is very similar to other CI/CD testing workflows. However, unlike other testing workflows, fuzz testing requires multiple jobs to run simultaneously, which results in a few extra steps. Fuzzbuzz is a fuzz testing platform. We make it trivial for developers to add fuzz tests to their code and run them in CI/CD, helping them catch critical bugs and vulnerabilities before they hit production. Fuzzbuzz completely integrates into your environment, following you from the terminal to CI/CD. Write a fuzz test in your environment and use your own IDE, terminal, or build tools. Push to CI/CD and Fuzzbuzz will automatically start running your fuzz tests against your latest code changes. Get notified when bugs are found through Slack, GitHub, or email. Catch regressions as new changes are automatically tested and compared to previous runs. Code is built and instrumented by Fuzzbuzz as soon as a change is detected.
  • 28
    Backengine

    Backengine

    Backengine

    Describe example API requests and responses. Define API endpoint logic in natural language. Test your API endpoints and fine-tune your prompt, response structure, and request structure. Deploy API endpoints with a single click and integrate into your applications. Build and deploy sophisticated application logic without writing any code in less than a minute. No individual LLM accounts required. Just sign up to Backengine and start building. Your endpoints run on our super fast backend architecture, available immediately. All endpoints are secure and protected so only you and your applications can use them. Easily manage your team members so everyone can work on your Backengine endpoints. Augment your Backengine endpoints with persistent data. A complete backend replacement. Use external APIs into your endpoints without doing any integration work yourself.
    Starting Price: $20 per month
  • 29
    OWASP WSFuzzer
    Fuzz testing or fuzzing is a software testing technique, that basically consists in finding implementation bugs using malformed/semi-malformed data injection in an automated fashion. Let’s consider an integer in a program, which stores the result of a user’s choice between 3 questions. When the user picks one, the choice will be 0, 1, or 2, which makes three practical cases. Integers are stored as a static size variable. If the default switch case hasn’t been implemented securely, the program may crash and lead to “classical” security issues. Fuzzing is the art of automatic bug finding, and its role is to find software implementation faults and identify them if possible. A fuzzer is a program that automatically injects semi-random data into a program/stack and detects bugs. The data-generation part is made of generators, and vulnerability identification relies on debugging tools. Generators usually use combinations of static fuzzing vectors.
  • 30
    Redactive

    Redactive

    Redactive

    Redactive's developer platform removes the specialist data engineering knowledge that developers need to learn, implement, and maintain to build scalable & secure AI-enhanced applications for your customers or productivity use cases for your employees. Built with enterprise security needs in mind so you can focus on getting to production quickly. Don't rebuild your permission models just because you're starting to implement AI in your business. Redactive always respects access controls set by the data source & our data pipeline can be configured to never store your end documents, reducing your risk on downstream technology vendors. Redactive has you covered with pre-built data connectors & reusable authentication flows to connect with an ever-growing list of tools, along with custom connectors and LDAP/IdP provider integrations so you can power your AI use cases no matter your architecture.
  • 31
    FastbuildAI

    FastbuildAI

    FastbuildAI

    FastbuildAI is an open source, self-hosted framework designed to empower AI developers and entrepreneurs to rapidly build and deploy full-stack AI applications with a commercial-ready setup. The platform provides a visual “DIY” interface that requires minimal coding, bundled tools for managing user authentication, subscription billing, usage metering, and payment integration, and a plugin engine that lets users extend functionality (e.g., chatbots, agent workflows, custom APIs, multi-modal features). It supports rapid deployment via Docker and offers flexible infrastructure (on-premises or cloud), allowing full control of branding, data, and monetization. With FastbuildAI, you can turn an AI concept into a live SaaS product in minutes, complete with GUI, plugin architecture, monetization tiering, and self-hosted operations. The framework is geared to support both technical users who want to customize flows and non-technical users who want to launch an AI-led business.
  • 32
    Llama Guard
    Llama Guard is an open-source safeguard model developed by Meta AI to enhance the safety of large language models in human-AI conversations. It functions as an input-output filter, classifying both prompts and responses into safety risk categories, including toxicity, hate speech, and hallucinations. Trained on a curated dataset, Llama Guard achieves performance on par with or exceeding existing moderation tools like OpenAI's Moderation API and ToxicChat. Its instruction-tuned architecture allows for customization, enabling developers to adapt its taxonomy and output formats to specific use cases. Llama Guard is part of Meta's broader "Purple Llama" initiative, which combines offensive and defensive security strategies to responsibly deploy generative AI models. The model weights are publicly available, encouraging further research and adaptation to meet evolving AI safety needs.
  • 33
    Graphcore

    Graphcore

    Graphcore

    Build, train and deploy your models in the cloud, using the latest IPU AI systems and the frameworks you love, with our cloud partners. Allowing you to save on compute costs and seamlessly scale to massive IPU compute when you need it. Get started with IPUs today with on-demand pricing and free tier offerings with our cloud partners. We believe our Intelligence Processing Unit (IPU) technology will become the worldwide standard for machine intelligence compute. The Graphcore IPU is going to be transformative across all industries and sectors with a real potential for positive societal impact from drug discovery and disaster recovery to decarbonization. The IPU is a completely new processor, specifically designed for AI compute. The IPU’s unique architecture lets AI researchers undertake entirely new types of work, not possible using current technologies, to drive the next advances in machine intelligence.
  • 34
    Apolo

    Apolo

    Apolo

    Access readily available dedicated machines with pre-configured professional AI development tools, from dependable data centers at competitive prices. From HPC resources to an all-in-one AI platform with an integrated ML development toolkit, Apolo covers it all. Apolo can be deployed in a distributed architecture, as a dedicated enterprise cluster, or as a multi-tenant white-label solution to support dedicated instances or self-service cloud. Right out of the box, Apolo spins up a full-fledged AI-centric development environment with all the tools you need at your fingertips. Apolo manages and automates the infrastructure and processes for successful AI development at scale. Apolo's AI-centric services seamlessly stitch your on-prem and cloud resources, deploy pipelines, and integrate your open-source and commercial development tools. Apolo empowers enterprises with the tools and resources necessary to achieve breakthroughs in AI.
    Starting Price: $5.35 per hour
  • 35
    Google OSS-Fuzz
    OSS-Fuzz offers continuous fuzzing for open source software. Fuzz testing is a well-known technique for uncovering programming errors in software. Many of these detectable errors, like buffer overflow, can have serious security implications. Google has found thousands of security vulnerabilities and stability bugs by deploying guided in-process fuzzing of Chrome components, and we now want to share that service with the open source community. OSS-Fuzz aims to make common open source software more secure and stable by combining modern fuzzing techniques with scalable, distributed execution. Projects that do not qualify for OSS-Fuzz can run their own instances of ClusterFuzz or ClusterFuzzLite. Currently, OSS-Fuzz supports C/C++, Rust, Go, Python, and Java/JVM code. Other languages supported by LLVM may work too. OSS-Fuzz supports fuzzing x86_64 and i386 builds.
  • 36
    Solidity Fuzzing Boilerplate
    Solidity Fuzzing Boilerplate is a template repository intended to ease fuzzing components of Solidity projects, especially libraries. Write tests once and run them with both Echidna and Foundry's fuzzing. Fuzz components that use incompatible Solidity versions by deploying those into a Ganache instance via Etheno. Use HEVM's FFI cheat code to generate complex fuzzing inputs or to compare outputs with non-EVM executables while doing differential fuzzing. Publish your fuzzing experiments without worrying about licensing by extending the shell script to download specific files. Turn off FFI if you don't intend to make use of shell commands from your Solidity contracts. Note that FFI is slow and should only be used as a workaround. It can be useful for testing against things that are difficult to implement within Solidity and already exist in other languages. Before executing tests of a project that has FFI enabled, be sure to check what commands are actually being executed.
  • 37
    Terra

    Terra

    Terra Security

    Terra offers agentic-AI powered continuous web application penetration testing as a service, combining AI agents with human expert supervision to deliver deep, business-context aware security assessments. It provides full coverage of an organization’s web application attack surface, continuously testing through changes rather than only at fixed intervals. The tool delivers real-time adaptability, meaning newly deployed or updated features are automatically evaluated for vulnerabilities, not waiting for quarterly or annual audits. Terra’s reports are designed to be compliance-audit ready, reflecting proof of exploitability, likelihood, potential breach comparison, and business impact, along with suggestions for remediation. It emphasizes prioritization of real risks, tailored to the customer's business context and risk profile, with visibility across all applications and features. Users benefit from increased efficiency and accuracy over traditional automated pentests.
  • 38
    Kognitos

    Kognitos

    Kognitos

    Build automations and manage exceptions all in intuitive english. Intuitively automate processes that contain structured and unstructured data, large transaction volumes, and complicated, exception-heavy workflows that are difficult for traditional automation tools. Processes that encounter exceptions, like document-heavy processes, have historically been difficult for RPA to build because of all the up-front development work to build in exception handling. Kognitos takes a fundamentally different approach by allowing your users to teach your automation how to handle the exceptions using natural language. Kognitos emulates the way we would teach one another how to resolve errors and edge cases by intuitive prompting that puts humans in control. Automation can now be trained to work just as you would train another human through experience and examples.
  • 39
    Caffe

    Caffe

    BAIR

    Caffe is a deep learning framework made with expression, speed, and modularity in mind. It is developed by Berkeley AI Research (BAIR) and by community contributors. Yangqing Jia created the project during his PhD at UC Berkeley. Caffe is released under the BSD 2-Clause license. Check out our web image classification demo! Expressive architecture encourages application and innovation. Models and optimization are defined by configuration without hard-coding. Switch between CPU and GPU by setting a single flag to train on a GPU machine then deploy to commodity clusters or mobile devices. Extensible code fosters active development. In Caffe’s first year, it has been forked by over 1,000 developers and had many significant changes contributed back. Thanks to these contributors the framework tracks the state-of-the-art in both code and models. Speed makes Caffe perfect for research experiments and industry deployment. Caffe can process over 60M images per day with a single NVIDIA K40 GPU.
  • 40
    Agentplace

    Agentplace

    Agentplace

    Agentplace is a platform where AI apps and websites are built directly on top of an AI model. No coding knowledge is required. Agentplace lets you create AI websites and apps. Now, ChatGPT has become your interactive and dynamic site, capable of answering questions, selling products, and delivering services. It leverages AI's adaptability, common sense, knowledge, and voice. You can program it entirely with text. The website's interface changes based on what users say or do. Instead of fixed pages, UI elements appear, update, or hide in response to user needs. For example, a form can add more fields as needed, or a product page can show different details based on user questions. Users can talk to your website like they would with ChatGPT. They can ask questions, get information, or complete tasks using voice. The site responds both verbally and visually, making it accessible while driving or cooking.
    Starting Price: $29 per month
  • 41
    APIsec

    APIsec

    APIsec

    Hackers are targeting loopholes in API logic. Learn how to secure APIs and prevent breaches and data leaks. APIsec finds critical flaws in API logic that attackers target to gain access to sensitive data. Unlike traditional security solutions that look for common security issues, such as injection attacks and cross-site scripting, APIsec pressure-tests the entire API to ensure no endpoints can be exploited. With APIsec you’ll know about vulnerabilities in your APIs before they get into production where hackers can exploit them. Run APIsec tests on your APIs at any stage of the development cycle to identify loopholes that can unintentionally give attackers access to sensitive data and functionality. Security doesn’t have to slow down Development. APIsec runs at the speed of DevOps, giving you continuous visibility into the security of your APIs. No need to wait for the next scheduled pen-test, APIsec tests are complete in minutes.
    Starting Price: $500 per month
  • 42
    Fuzzing Project

    Fuzzing Project

    Fuzzing Project

    Fuzzing is a powerful strategy to find bugs in software. The idea is quite simple, which is to generate a large number of randomly malformed inputs for the software to parse and see what happens. If the program crashes then something is likely wrong. While fuzzing is a well-known strategy, it is surprisingly easy to find bugs, often with security implications, in widely used software. Memory access errors are the errors most likely to be exposed when fuzzing software that is written in C/C++. While they differ in the details, the core problem is often the same, the software reads or writes to the wrong memory locations. A modern Linux or BSD system ships a large number of basic tools that do some kind of file displaying and parsing. In their current state, most of these tools are not suitable for untrusted inputs. On the other hand, we have powerful tools these days that allow us to find and analyze these bugs.
  • 43
    Omni AI

    Omni AI

    Omni AI

    Omni is a powerful AI framework allowing you to connect Prompts, Tools and customized logic to LLM Agents. Agents are built upon the ReAct paradigm (Reason + Act) and allow LLM models to engage with a multitude of tools and custom components to accomplish a task. Automate customer support, document processing, lead qualification, and more. You can seamlessly switch between prompts and LLM architectures to optimize performance. We host your workflows as APIs so that you can access AI instantly.
  • 44
    BugProve

    BugProve

    BugProve

    Founded by former security researchers, BugProve offers an automated firmware analysis platform. - Swift Results: Upload firmware, and get a security report in 5 mins. - Supply Chain Risk Management: Identify components and vulnerabilities with optional CVE monitoring for compliance. - Zero-day Engine: Detect memory corruption vulnerabilities before exploits happen. - All-in-One Hub: Easily access reevaluations, comparisons, and updates in a user-friendly format. - Effortless Sharing: Share findings via live links or export as PDFs for simple reporting. - Accelerated Testing: Save weeks in pentesting, focus on in-depth discoveries, and launch more secure products. - No Source Code Needed: Run checks directly on firmware, including static/dynamic analysis, multi-binary taint analysis, and more. Skeptical? Sign up with our Free Plan and check it yourself, no commitment required.
    Starting Price: $700/month
  • 45
    Beakr

    Beakr

    Beakr

    Try different prompts and find what works best. Track the latency and cost of each prompt. Set up your prompts with dynamic variables. Call them via API and insert variables into the prompt. Combine the power of different LLMs within your application. Track the latency and cost of requests to optimize what works best. Test different prompts and save your favorite ones.
  • 46
    Maxim

    Maxim

    Maxim

    Maxim is an agent simulation, evaluation, and observability platform that empowers modern AI teams to deploy agents with quality, reliability, and speed. Maxim's end-to-end evaluation and data management stack covers every stage of the AI lifecycle, from prompt engineering to pre & post release testing and observability, data-set creation & management, and fine-tuning. Use Maxim to simulate and test your multi-turn workflows on a wide variety of scenarios and across different user personas before taking your application to production. Features: Agent Simulation Agent Evaluation Prompt Playground Logging/Tracing Workflows Custom Evaluators- AI, Programmatic and Statistical Dataset Curation Human-in-the-loop Use Case: Simulate and test AI agents Evals for agentic workflows: pre and post-release Tracing and debugging multi-agent workflows Real-time alerts on performance and quality Creating robust datasets for evals and fine-tuning Human-in-the-loop workflows
    Starting Price: $29/seat/month
  • 47
    Promptitude

    Promptitude

    Promptitude

    The easiest & fastest way to integrate GPT into your apps & workflows. Make your SaaS & mobile apps stand out with the power of GPT, Develop, test, manage, and improve all your prompts in one place. Then integrate with one simple API call, no matter which provider. Gain new users for your SaaS app, and wow existing ones by adding powerful GPT features like text generation, information extraction, etc. Be ready for production in less than a day thanks to Promptitude. Creating perfect, powerful GPT prompts is a work of art. With Promptitude, you can finally develop, test, and manage all your prompts in one place. And with a built-in end-user rating, improving your prompts is a breeze. Make your hosted GPT and NLP APIs available to a wide audience of SaaS & software developers. Boost API usage by empowering your users with easy-to-use prompt management by Promptitude. You can even mix and match different AI providers and models, saving costs by picking the smallest sufficient model.
    Starting Price: $19 per month
  • 48
    Reporter

    Reporter

    Security Reporter

    Security Reporter is an enterprise-grade pentest reporting software designed to streamline and standardize the penetration testing and security assessment reporting workflow. The platform supports security teams and pentesting providers in managing findings, producing professional reports, and delivering consistent results across complex environments. Key capabilities include a centralized content and vulnerability library, customizable report templates, multi-language reporting, and native imports from more than 140 security testing tools. These features support efficient vulnerability management, accurate reporting, and repeatable assessment processes. Security Reporter is offered exclusively as a self-hosted, on-premise solution, ensuring full control over sensitive security data and supporting common compliance and data governance requirements. By reducing manual reporting effort and minimizing errors, the platform improves productivity and shortens reporting cycles.
  • 49
    MXNet

    MXNet

    The Apache Software Foundation

    A hybrid front-end seamlessly transitions between Gluon eager imperative mode and symbolic mode to provide both flexibility and speed. Scalable distributed training and performance optimization in research and production is enabled by the dual parameter server and Horovod support. Deep integration into Python and support for Scala, Julia, Clojure, Java, C++, R and Perl. A thriving ecosystem of tools and libraries extends MXNet and enables use-cases in computer vision, NLP, time series and more. Apache MXNet is an effort undergoing incubation at The Apache Software Foundation (ASF), sponsored by the Apache Incubator. Incubation is required of all newly accepted projects until a further review indicates that the infrastructure, communications, and decision-making process have stabilized in a manner consistent with other successful ASF projects. Join the MXNet scientific community to contribute, learn, and get answers to your questions.
  • 50
    Gecko Security

    Gecko Security

    Gecko Security

    Gecko makes it possible to find 0 days that previously only humans could find. We are on a mission to automate hacker intuition and build the next generation of security tooling. Gecko is an AI-powered security engineer that finds and fixes vulnerabilities in your codebase. Gecko tests your code like a hacker and finds logical vulnerabilities that slip past other tools. Findings are verified in a secure sandbox, minimizing false positives. Gecko integrates into your environment and catches vulnerabilities as they emerge. Secure the code you ship without slowing down development. Vulnerabilities are verified and prioritized. No noise, only actual risk. Gecko creates targeted attack scenarios to test your code like a hacker. No more wasting engineering time and cost on patching vulnerabilities. Connect your existing SAST tools and integrate them into your security stack. Our optimized testing can complete comprehensive pentests in hours.