Affiliations

Code Dx is proud to be associated with the following organizations:

Morgridge-Swamp

 

DHS S&T Software Assurance Marketplace (SWAMP) – Code Dx is a partner of the SWAMP, a no-cost service provided by DHS where developers can simultaneously run multiple software analysis tools and view the consolidated set of results using Code Dx.

 

300px-Owasp_logo

OWASP – Code Dx is a member and leader of the Long Island chapter of this not-for-profit organization focused on improving software security.

Code Dx has developed and continues to support the ongoing OWASP Code Pulse project to support the tuning of dynamic application security testing tools. For more information about Code Pulse see https://codedx.com/code-pulse/ or go to https://www.owasp.org/index.php/OWASP_Code_Pulse_Project.

 

bitnami-logo

Bitnami – Code Dx is available on the Bitnami marketplace making the process of getting up and running with Code Dx easy for both quick evaluations and production installations.

 

checkmarx

Checkmarx – Code Dx is a technology partner of this global leader in software application security. When used together, the technology makes it easier for users to scan mobile and web application code and eliminate software risk.

 

 

 


Contrast Security
– Now, in Code Dx version 2.4, through its partnership with Contrast Security, Code Dx supports IAST, which combines static and dynamic AST methods to enhance testing results by detecting vulnerabilities from within a running application. Read More

Burp Suite

 

 

 

Code Dx added integration with one of the most popular (and most often requested) AppSec tools: Burp Suite, by PortSwigger. Burp Suite provides outstanding automated penetration testing capabilities. Though pen testing isn’t a new technique—in fact, it’s one of the oldest ones—it remains an invaluable AppSec technique. While many SAST tools can determine whether or not there are known vulnerabilities in the source code, not all of them are actually exploitable from the outside. Pen testing takes the opposite approach; it discovers what vulnerabilities can be exploited from the outside-in.

WordPress Lightbox Plugin