Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€
β142Feb 26, 2026Updated last month
Alternatives and similar repositories for vscode-security-notes
Users that are interested in vscode-security-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β58Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 2 years ago
- β14Apr 23, 2019Updated 6 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ107Jan 30, 2025Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!β702Dec 6, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Compares and analyzes GCP IAM roles.β79Mar 9, 2025Updated last year
- β192Apr 16, 2025Updated 11 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Jan 18, 2022Updated 4 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behaviorβ53Feb 16, 2026Updated last month
- An extension to use Semgrep inside Burp Suite.β88May 23, 2025Updated 10 months ago
- β105Jan 3, 2023Updated 3 years ago
- A curated list of Awesome Security Challenges.β211Nov 6, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Toolβ742Mar 26, 2026Updated 2 weeks ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectorsβ14May 21, 2024Updated last year
- An injector that use PT_LOAD techniqueβ12Nov 27, 2022Updated 3 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β354Mar 10, 2026Updated last month
- β17May 16, 2022Updated 3 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β44Mar 9, 2026Updated last month
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ82Jul 25, 2022Updated 3 years ago
- β114Jun 8, 2023Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Secβ¦β327Aug 13, 2025Updated 7 months ago
- A GitHub Action for pip-auditβ87Mar 30, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- List of custom Nuclei templatesβ16Nov 4, 2023Updated 2 years ago
- β33Updated this week
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Nov 11, 2024Updated last year
- Proof of Concepts for unsafe deserialization in Rubyβ17Oct 17, 2024Updated last year
- Secrets scanner that understands codeβ192Nov 2, 2023Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructureβ49Dec 29, 2023Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.β449Updated this week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.β281Sep 11, 2025Updated 6 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β341Apr 1, 2026Updated last week
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kubernetes Pwnage for allβ59Nov 14, 2020Updated 5 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β89Jan 28, 2024Updated 2 years ago
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ60Apr 1, 2026Updated last week
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β76Aug 22, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.β298May 5, 2024Updated last year
- Userland exec PoC to be used as attack vector techniqueβ97Oct 23, 2025Updated 5 months ago
- A meta-database collecting resources that compile lists of breachesβ22Oct 30, 2025Updated 5 months ago