SecureStackCo / actions-codeLinks
A GitHub Action for using SecureStack to analyse a repository codebase for vulnerabilities in library dependencies (software composition analysis).
☆22Updated 3 years ago
Alternatives and similar repositories for actions-code
Users that are interested in actions-code are comparing it to the libraries listed below
Sorting:
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 4 months ago
- Manager of third-party sources of Semgrep rules 🗂☆88Updated last year
- SecureStack Application Bill of Materials (ABOM/SBOM)☆13Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- A GitHub Action that scans your public web applications for log4j vulnerabilities after every deployment. Add this to your dev, staging a…☆15Updated 3 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆63Updated 5 months ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- ☆84Updated last year
- ☆64Updated 3 years ago
- Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host s…☆31Updated 2 years ago
- ☆72Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- ☆31Updated last year
- ☆44Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- ☆95Updated 4 years ago
- ☆90Updated 3 years ago
- A curated GitHub repository that's in-scope and eligible for bounty.☆21Updated 3 years ago
- ☆22Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 8 months ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- Prototype Pollution exploits collection☆34Updated 4 years ago
- My custom semgrep rules☆22Updated 5 years ago