Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€
β142May 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for vscode-security-notes
Users that are interested in vscode-security-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β59May 5, 2026Updated 2 weeks ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 3 years ago
- β14Apr 23, 2019Updated 7 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ109Jan 30, 2025Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!β706Dec 6, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Compares and analyzes GCP IAM roles.β79Mar 9, 2025Updated last year
- β193Apr 16, 2025Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Jan 18, 2022Updated 4 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behaviorβ60Feb 16, 2026Updated 3 months ago
- An extension to use Semgrep inside Burp Suite.β89May 23, 2025Updated 11 months ago
- A curated list of Awesome Security Challenges.β211Nov 6, 2024Updated last year
- β105Jan 3, 2023Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectorsβ14May 21, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β357Apr 21, 2026Updated 3 weeks ago
- β17May 16, 2022Updated 4 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ82Jul 25, 2022Updated 3 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Secβ¦β331Aug 13, 2025Updated 9 months ago
- β114Jun 8, 2023Updated 2 years ago
- A GitHub Action for pip-auditβ88May 12, 2026Updated last week
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β48Updated this week
- List of custom Nuclei templatesβ16Nov 4, 2023Updated 2 years ago
- β35May 13, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Nov 11, 2024Updated last year
- Proof of Concepts for unsafe deserialization in Rubyβ17Oct 17, 2024Updated last year
- Secrets scanner that understands codeβ192Nov 2, 2023Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructureβ49Dec 29, 2023Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.β448May 8, 2026Updated last week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.β278Sep 11, 2025Updated 8 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β338May 7, 2026Updated last week
- Kubernetes Pwnage for allβ59Nov 14, 2020Updated 5 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β89Jan 28, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available β’ AdRun AI, ML, and HPC workloads on powerful cloud GPUsβwithout limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ59May 8, 2026Updated last week
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β76Aug 22, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.β298May 5, 2024Updated 2 years ago
- A meta-database collecting resources that compile lists of breachesβ22Oct 30, 2025Updated 6 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports fβ¦β143Jan 24, 2023Updated 3 years ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.β265Mar 30, 2026Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environmentβ33Oct 14, 2024Updated last year