Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€
β142Feb 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for vscode-security-notes
Users that are interested in vscode-security-notes are comparing it to the libraries listed below
Sorting:
- β58Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 2 years ago
- β14Apr 23, 2019Updated 6 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ107Jan 30, 2025Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!β701Dec 6, 2025Updated 3 months ago
- Compares and analyzes GCP IAM roles.β78Mar 9, 2025Updated last year
- β192Apr 16, 2025Updated 11 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Jan 18, 2022Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.β88May 23, 2025Updated 9 months ago
- β105Jan 3, 2023Updated 3 years ago
- A curated list of Awesome Security Challenges.β211Nov 6, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Toolβ736Mar 5, 2026Updated 2 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectorsβ14May 21, 2024Updated last year
- An injector that use PT_LOAD techniqueβ12Nov 27, 2022Updated 3 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β341Mar 10, 2026Updated last week
- β17May 16, 2022Updated 3 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ82Jul 25, 2022Updated 3 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β44Mar 9, 2026Updated last week
- β114Jun 8, 2023Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Secβ¦β325Aug 13, 2025Updated 7 months ago
- A GitHub Action for pip-auditβ86Updated this week
- List of custom Nuclei templatesβ16Nov 4, 2023Updated 2 years ago
- β33Mar 7, 2026Updated 2 weeks ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Nov 11, 2024Updated last year
- Proof of Concepts for unsafe deserialization in Rubyβ17Oct 17, 2024Updated last year
- A meta-database collecting resources that compile lists of breachesβ21Oct 30, 2025Updated 4 months ago
- Secrets scanner that understands codeβ192Nov 2, 2023Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructureβ49Dec 29, 2023Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.β449Mar 9, 2026Updated last week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.β281Sep 11, 2025Updated 6 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β339Updated this week
- Kubernetes Pwnage for allβ58Nov 14, 2020Updated 5 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β89Jan 28, 2024Updated 2 years ago
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β76Aug 22, 2024Updated last year
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ60Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.β297May 5, 2024Updated last year
- Userland exec PoC to be used as attack vector techniqueβ96Oct 23, 2025Updated 4 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.β247Dec 8, 2025Updated 3 months ago