Generate thousands of pull requests to fix widespread security vulnerabilities across GitHub.
☆36May 14, 2025Updated 10 months ago
Alternatives and similar repositories for bulk-security-pr-generator
Users that are interested in bulk-security-pr-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Google word2vec tools built for windows compiled with visual studio 2017 and dev c++ on Windows 10 x64.☆15Jun 9, 2017Updated 8 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- ☆18Feb 26, 2018Updated 8 years ago
- ☆12Mar 23, 2024Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Ⓣ OwnTags is an OwnTracks client for tracking your own 'AirTags' 🏷 made with OpenHaystack.☆13Sep 12, 2023Updated 2 years ago
- A GitHub Action that allows Pixee to fix issues found by other code scanners☆15Jan 16, 2025Updated last year
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Security toolkit for the Python community☆15Feb 11, 2025Updated last year
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- A collection of exploits or general scripts that often come in handy during CTFs☆10Apr 29, 2020Updated 5 years ago
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- A sample API that retrieves constellations as an example to demonstrate features in the OpenAPI 3.0 specification.☆14Nov 12, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Training materials for Security Camp 2020 (B7), a state-sponsored security education event in Japan☆14Oct 4, 2021Updated 4 years ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- Static Analysis Results Interchange Format (SARIF) For OCaml☆14Mar 13, 2025Updated last year
- Interactive CD dependency diagram☆31Feb 15, 2026Updated last month
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- 基于Python爬虫的CNNVD漏洞信息监控脚本——Cnnvd_monitor,实现了对CNNVD官网平台的实时监控、数据获取、入库、并用微信进行实时推送、并将获取的数据进行Web端表格展示。☆15Aug 9, 2021Updated 4 years ago
- ☆11Aug 29, 2020Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")☆18Sep 29, 2023Updated 2 years ago
- ☆11May 15, 2020Updated 5 years ago
- This repository contains a number of insecure self-hosted applications that allows interested security engineers to test vulnerabilities …☆26Apr 30, 2025Updated 11 months ago
- An MCP (Model Context Protocol) server that provides tools for checking Maven dependency versions.☆31Oct 9, 2025Updated 5 months ago
- A lightweight gitlab irc bot that announces commit messages☆20Nov 18, 2015Updated 10 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Log-based anomaly detection☆14Jul 2, 2025Updated 8 months ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago
- The SonarQube plugin for jQAssistant☆15Mar 13, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆12Nov 14, 2023Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Oct 24, 2022Updated 3 years ago
- CDK constructs for working with RDS☆18Oct 2, 2025Updated 5 months ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Jul 18, 2022Updated 3 years ago
- Fuzz WebSockets with custom Python code☆20Aug 21, 2024Updated last year
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆43Dec 3, 2025Updated 3 months ago