SecureStackCo / actions-codeLinks
A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition analysis).
☆22Updated 3 years ago
Alternatives and similar repositories for actions-code
Users that are interested in actions-code are comparing it to the libraries listed below
Sorting:
- An extension to use Semgrep inside Burp Suite.☆89Updated 5 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆42Updated this week
- ☆90Updated 3 years ago
- ☆16Updated 4 years ago
- Security Advisories☆34Updated last month
- Python script to launch burp scans automatically☆33Updated 4 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Updated 4 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- ☆95Updated 4 years ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 3 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 2 years ago
- ☆10Updated 2 years ago
- Additional active scan checks for BURP☆28Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆53Updated last year
- ☆72Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆31Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 3 months ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆25Updated 4 months ago
- Demo of various ways to exploit post based reflected XSS☆18Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago