247arjun / ai-secure-code-reviewLinks
Welcome to `ai-secure-code-review`, a repository that integrates static analysis tools with Generative AI, specifically Semgrep and Azure OpenAI's GPT models, to automate and enhance code reviews for improved efficiency, scalability, and effectiveness in identifying potential software vulnerabilities.
☆36Updated last year
Alternatives and similar repositories for ai-secure-code-review
Users that are interested in ai-secure-code-review are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Java (EE) Application☆144Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- LLM Testing Findings Templates☆75Updated last year
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 2 months ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 4 months ago
- ☆84Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- A project to visualize the software supply chain☆55Updated 2 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 8 months ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆192Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆103Updated 2 years ago
- ☆195Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆167Updated 2 years ago
- Tools to assess DNS security.☆153Updated last year
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆92Updated 2 weeks ago
- ☆114Updated 2 years ago
- OWASP Code Review Guide Web Repository☆147Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆263Updated 3 months ago
- A research project to add some brrrrrr to Burp☆196Updated 11 months ago
- ☆220Updated 3 weeks ago
- ☆154Updated 2 years ago
- Docker toolbox for pentest of web based application.☆173Updated last week
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆164Updated 2 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆203Updated last month