What Integrates with DefectDojo?
Find out what DefectDojo integrations exist in 2025. Learn what software and services currently integrate with DefectDojo, and sort them by reviews, cost, features, and more. Below is a list of products that DefectDojo currently integrates with:
-
1
Crashtest Security
Crashtest Security
€35 per month 5 RatingsCrashtest Security, a SaaS-based security vulnerability scanner, allows agile development teams to ensure continuous security even before reaching Production. Our state-of the-art dynamic application security test (DAST), integrates seamlessly into your development environment and protects multipage and JavaScript applications, as well microservices and APIs. Crashtest Security Suite can be set up in minutes. You will also have advanced crawling options and the ability to automate your security. Crashtest Security can help you keep your code and customers safe by allowing you to see vulnerabilities in the OWASP Top 10. -
2
Probely is a web security scanner for agile teams. It allows continuous scanning of web applications. It also lets you manage the lifecycle of vulnerabilities found in a clean and intuitive web interface. It also contains simple instructions for fixing the vulnerabilities (including snippets code). Using its full-featured API it can be integrated into development pipelines (SDLC) or continuous integration pipelines, to automate security testing. Probely empowers developers to become more independent. This solves the security team's scaling problem that is often undersized compared to development teams. It provides developers with a tool to make security testing more efficient, which allows security teams to concentrate on more important activities. Probely covers OWASP TOP10, thousands more, and can be used for checking specific PCI-DSS and ISO27001 requirements.
-
3
Semgrep
r2c
$40 per monthContemporary security teams are essentially creating a supportive environment for developers by implementing code guardrails with each commit. With the capabilities of r2c’s Semgrep, organizations can effectively eradicate classes of vulnerabilities across the board. Enhance the efficiency of your security team through the use of lightweight static analysis tools. Semgrep stands out as a rapid, open-source static analysis solution that simplifies the expression of coding standards without the need for complex queries, allowing for early detection of bugs in the development process. The rules are designed to mirror the code being analyzed, eliminating the challenges associated with navigating abstract syntax trees or dealing with regex complexities. You can easily get started with over 900 pre-existing rules and utilize SaaS infrastructure to receive quick feedback directly in your editor, at the time of commit, or within continuous integration environments. If the standard rules do not meet your specific needs, you can swiftly and easily craft custom rules that reflect your organization’s unique coding standards, with the syntax resembling the target code. For instance, rules tailored for Go are presented in a way that aligns closely with the Go language itself, enabling you to identify function calls, class and method definitions, and much more without the burden of abstract syntax trees or regex challenges. This approach not only streamlines the security process but also empowers developers to maintain high-quality code more efficiently. -
4
Deepinfo
Deepinfo
$20,000 per yearDeepinfo has the most comprehensive Internet data. We are passionate about cybersecurity and proud to make the Internet safer. We provide relevant data and comprehensive threat intelligence solutions to empower cybersecurity professionals to build a more secure organization. Deepinfo Attack Surface Platform empowers organizations to identify, classify and monitor sensitive data across all digital assets in real-time. -
5
Trivy
Aqua Security
FreeTrivy serves as a robust and adaptable security scanning tool. It features a variety of scanners designed to identify security vulnerabilities and the various targets where these issues may arise. This tool is compatible with a wide array of programming languages, operating systems, and platforms, making it highly accessible. You can find Trivy through numerous common distribution channels, enhancing its reach. Additionally, Trivy seamlessly integrates with many widely-used platforms and applications, allowing for effortless incorporation of security measures into your workflow. With Trivy, users can detect vulnerabilities, misconfigurations, secrets, and SBOM across diverse environments such as containers, Kubernetes, code repositories, and cloud infrastructures, ensuring comprehensive security coverage for their projects. Its extensive capabilities make it an invaluable asset for maintaining security in modern development practices. -
6
CycloneDX
CycloneDX
CycloneDX is an efficient standard for Software Bill of Materials (SBOM) that is specifically crafted for application security and the analysis of supply chain components. The governance and ongoing development of this specification are overseen by the CycloneDX Core working group, which has its roots in the OWASP community. A thorough and precise catalog of both first-party and third-party components is crucial for identifying potential risks. Ideally, BOMs should encompass all direct and transitive components, as well as the interdependencies that exist among them. By implementing CycloneDX, organizations can swiftly fulfill essential requirements and progressively evolve to incorporate more advanced applications in the future. Furthermore, CycloneDX meets all SBOM criteria set forth in the OWASP Software Component Verification Standard (SCVS), ensuring comprehensive compliance and security management. This capability makes it an invaluable tool for organizations aiming to enhance their software supply chain integrity.
- Previous
- You're on page 1
- Next