Rules for Bearer SAST
☆39Mar 26, 2026Updated last month
Alternatives and similar repositories for bearer-rules
Users that are interested in bearer-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- ☆11Dec 19, 2024Updated last year
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- Terraform provider for command execution☆12Mar 16, 2020Updated 6 years ago
- ClickFix attack lures and variants☆10Aug 8, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Apr 8, 2026Updated last month
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆24Oct 25, 2018Updated 7 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Utilities for testing your Python functions for Scaleway Serverless Functions.☆15Apr 27, 2026Updated last week
- Scaleway Serverless Functions (FaaS) framework to increase developer experience, local testing and more☆11May 16, 2023Updated 2 years ago
- CVE-2022-37042 Zimbra Auth Bypass leads to RCE☆30Dec 9, 2022Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆14May 28, 2025Updated 11 months ago
- ☆30Oct 13, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tree traversal and transform functions☆12Jun 7, 2015Updated 10 years ago
- ☆19Feb 3, 2026Updated 3 months ago
- ☆18Dec 25, 2024Updated last year
- Grepz is a versatile command-line tool for searching and highlighting specific terms or regex in a text file. Its customizable color opti…☆15May 4, 2023Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- A tool for folks who `git clone` first and ask questions later☆68Apr 15, 2026Updated 3 weeks ago
- ☆72Mar 26, 2022Updated 4 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- The burp extension to forward the request☆10Oct 21, 2024Updated last year
- A command-line tool for streamlining end-to-end compliance workflows on local systems.☆31Updated this week
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 5 years ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated 2 years ago
- This is a tool for analyzing and finding the SDK integrated in the apk.☆12Nov 14, 2019Updated 6 years ago
- Proxy Management for Security Professionals☆25Mar 25, 2025Updated last year
- ☆11May 21, 2019Updated 6 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- 帮助红队收集目标企业员工的邮箱信息,借助必应搜索引擎爬取邮箱。☆25Apr 26, 2022Updated 4 years ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆107Oct 13, 2025Updated 6 months ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 3 years ago
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Apr 23, 2021Updated 5 years ago
- Agentic C2-style MCP server for Frida instrumentation on rooted Android and jailbroken iOS.☆49Mar 18, 2026Updated last month