247arjun / ai-secure-code-reviewLinks
Welcome to `ai-secure-code-review`, a repository that integrates static analysis tools with Generative AI, specifically Semgrep and Azure OpenAI's GPT models, to automate and enhance code reviews for improved efficiency, scalability, and effectiveness in identifying potential software vulnerabilities.
☆36Updated last year
Alternatives and similar repositories for ai-secure-code-review
Users that are interested in ai-secure-code-review are comparing it to the libraries listed below
Sorting:
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 3 weeks ago
- Damn Vulnerable Java (EE) Application☆143Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 6 months ago
- LLM Testing Findings Templates☆75Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- ☆114Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- ☆85Updated 2 years ago
- Damn Vulnerable Python Web App☆181Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆258Updated 2 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- ☆205Updated last week
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆134Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- OWASP Code Review Guide Web Repository☆146Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Updated 4 years ago
- ☆116Updated 2 years ago
- A project to visualize the software supply chain☆54Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆289Updated 2 months ago
- ☆100Updated this week
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago