SecureStackCo / actions-codeLinks
A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition analysis).
☆22Updated 3 years ago
Alternatives and similar repositories for actions-code
Users that are interested in actions-code are comparing it to the libraries listed below
Sorting:
- An extension to use Semgrep inside Burp Suite.☆89Updated 6 months ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- OWASP ASVS Security Evaluation Templates with Nuclei☆42Updated 2 weeks ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆35Updated 9 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- Security Advisories☆35Updated last month
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆42Updated 2 weeks ago
- ☆95Updated 4 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆26Updated 6 months ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- My talks...☆25Updated 9 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated last year
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- The commands and scripts I used in the Live Recon Village talks☆39Updated 4 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆74Updated last year
- ☆64Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Curated lists of InfoSec on Twitter. Find out who's awesome to follow!☆91Updated 4 years ago
- Monitoring the Cloud Landscape☆91Updated this week
- ☆16Updated 3 weeks ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 7 months ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 3 years ago