Bearer / bearer-rulesLinks
Rules for Bearer SAST
☆36Updated 2 months ago
Alternatives and similar repositories for bearer-rules
Users that are interested in bearer-rules are comparing it to the libraries listed below
Sorting:
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- ☆225Updated last month
- A collection of my Semgrep rules☆51Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Updated 10 months ago
- My custom semgrep rules☆23Updated 5 years ago
- WAF bypass PoC☆50Updated 2 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Updated 3 years ago
- ☆31Updated 3 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Updated last year
- ☆44Updated 6 months ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆56Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated last year
- Find CVE PoCs on GitHub☆158Updated 5 months ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆97Updated last month
- Intentionally vulnerable Go web app.☆42Updated 3 months ago
- ☆16Updated 2 months ago
- ☆65Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated last year
- ☆63Updated 3 months ago
- Dependency Combobulator☆95Updated 2 years ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Updated 2 years ago
- ☆87Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- Damn Vulnerable SCA Application☆43Updated this week
- ☆31Updated 3 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆62Updated 9 months ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated 3 years ago