Rules for Bearer SAST
☆36Mar 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for bearer-rules
Users that are interested in bearer-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- ☆11Dec 19, 2024Updated last year
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.☆2,600Mar 19, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Oct 25, 2018Updated 7 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Scaleway Serverless Functions (FaaS) framework to increase developer experience, local testing and more☆11May 16, 2023Updated 2 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- ☆17Feb 3, 2026Updated last month
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- ☆30Oct 13, 2025Updated 5 months ago
- ECMAScript source modification tool☆62Feb 6, 2016Updated 10 years ago
- Snyk Node Runtime Agent☆16Apr 12, 2022Updated 3 years ago
- ☆18Dec 25, 2024Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- Check Redis instance for security vulnerabilities.☆13Sep 20, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆72Mar 26, 2022Updated 4 years ago
- ☆18Feb 2, 2026Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- The burp extension to forward the request☆10Oct 21, 2024Updated last year
- GNOME Shell extension for showing UTC time on the top bar☆14Mar 15, 2026Updated last week
- A terminal-based interactive chat interface for Meshtastic LoRa devices. `meshtui` provides a curses-powered UI for real-time messaging, …☆28Oct 15, 2025Updated 5 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated last month
- Proxy Management for Security Professionals☆24Mar 25, 2025Updated last year
- ☆11May 21, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- Agentic C2-style MCP server for Frida instrumentation on rooted Android and jailbroken iOS.☆44Mar 18, 2026Updated last week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆105Oct 13, 2025Updated 5 months ago
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 4 years ago