Bearer / bearer-rules
Rules for Bearer SAST
☆27Updated last month
Alternatives and similar repositories for bearer-rules
Users that are interested in bearer-rules are comparing it to the libraries listed below
Sorting:
- Dependency Combobulator☆93Updated last year
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Updated 3 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆16Updated 6 months ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆58Updated 3 weeks ago
- ☆31Updated 2 years ago
- My custom semgrep rules☆21Updated 4 years ago
- WAF bypass PoC☆47Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆22Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- A collection of my Semgrep rules☆49Updated last year
- Intentionally vulnerable Go web app.☆43Updated 3 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last week
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Updated 2 years ago
- Public disclosure channel for security vulnerabilities☆18Updated last year
- ☆71Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 4 months ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 8 months ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 9 months ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆26Updated last year
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Sharing software supply chain security open source projects☆49Updated 2 years ago
- Efficient DevSecOps☆47Updated 5 months ago
- ☆32Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 8 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year