SecureStackCo / actions-codeLinks
A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition analysis).
☆22Updated 3 years ago
Alternatives and similar repositories for actions-code
Users that are interested in actions-code are comparing it to the libraries listed below
Sorting:
- An extension to use Semgrep inside Burp Suite.☆89Updated 6 months ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 3 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Updated 4 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 8 months ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- A collection of my Semgrep rules☆51Updated 2 years ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆42Updated last week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 3 years ago
- Find sources and sinks in js code that could lead to DOM XSS 🔎💧🚰☆22Updated last year
- ☆95Updated 4 years ago
- ☆56Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Updated 3 years ago
- ☆72Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 2 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- ☆75Updated last year
- A collection of Burp Suite Lambda Filters ~ Bambdas☆29Updated last year
- ☆44Updated 5 years ago
- ☆84Updated last year
- Curated lists of InfoSec on Twitter. Find out who's awesome to follow!☆92Updated 4 years ago
- Security Advisories☆34Updated 3 weeks ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆64Updated 6 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago