Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€
β142Feb 26, 2026Updated 2 months ago
Alternatives and similar repositories for vscode-security-notes
Users that are interested in vscode-security-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β59Apr 20, 2026Updated last week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61May 15, 2023Updated 2 years ago
- β14Apr 23, 2019Updated 7 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ107Jan 30, 2025Updated last year
- Awesome secure by default libraries to help you eliminate bug classes!β703Dec 6, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Compares and analyzes GCP IAM roles.β79Mar 9, 2025Updated last year
- β193Apr 16, 2025Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Jan 18, 2022Updated 4 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behaviorβ57Feb 16, 2026Updated 2 months ago
- An extension to use Semgrep inside Burp Suite.β88May 23, 2025Updated 11 months ago
- β106Jan 3, 2023Updated 3 years ago
- A curated list of Awesome Security Challenges.β211Nov 6, 2024Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Oct 3, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectorsβ14May 21, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An injector that use PT_LOAD techniqueβ12Nov 27, 2022Updated 3 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β356Apr 21, 2026Updated last week
- β17May 16, 2022Updated 3 years ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveraginβ¦β45Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightingsβ82Jul 25, 2022Updated 3 years ago
- β114Jun 8, 2023Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Secβ¦β328Aug 13, 2025Updated 8 months ago
- A GitHub Action for pip-auditβ87Apr 20, 2026Updated last week
- List of custom Nuclei templatesβ16Nov 4, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- β35Updated this week
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Nov 11, 2024Updated last year
- Proof of Concepts for unsafe deserialization in Rubyβ17Oct 17, 2024Updated last year
- Secrets scanner that understands codeβ191Nov 2, 2023Updated 2 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructureβ49Dec 29, 2023Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.β448Updated this week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.β279Sep 11, 2025Updated 7 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β341Apr 23, 2026Updated last week
- Kubernetes Pwnage for allβ59Nov 14, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β89Jan 28, 2024Updated 2 years ago
- AttachΓ© provides an emulation layer for Cloud Provider IMDS APIsβ60Apr 23, 2026Updated last week
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β76Aug 22, 2024Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.β298May 5, 2024Updated last year
- A meta-database collecting resources that compile lists of breachesβ22Oct 30, 2025Updated 6 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports fβ¦β142Jan 24, 2023Updated 3 years ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.β257Mar 30, 2026Updated last month