My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)
☆43Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for akabe1-semgrep-rules
Users that are interested in akabe1-semgrep-rules are comparing it to the libraries listed below
Sorting:
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- A tool to notify you of the latest changes in bug bounty programs.☆16Jan 24, 2025Updated last year
- A tiny demo app using SSL pinning to block HTTPS MitM interception☆13Aug 8, 2022Updated 3 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- Create subdomains and files wordlists from your browser history☆13Jan 10, 2023Updated 3 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Mar 22, 2023Updated 2 years ago
- Curated Collection of Popular Community Rules for Semgrep☆18Dec 27, 2023Updated 2 years ago
- Simple mind maps for IoT security attack surfaces and methodologies☆17Aug 12, 2019Updated 6 years ago
- Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021☆16Jan 3, 2022Updated 4 years ago
- Fuzz every path with goky☆15Jan 4, 2024Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆97Sep 24, 2023Updated 2 years ago
- ☆18Dec 20, 2025Updated 2 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆321Nov 12, 2025Updated 3 months ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- script python to check url list via cookies and Authorization☆19Feb 28, 2023Updated 3 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated this week
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Semgrep queries developed by Trail of Bits.☆484Nov 12, 2025Updated 3 months ago
- ☆24Feb 12, 2016Updated 10 years ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,088Updated this week
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆46Dec 19, 2025Updated 2 months ago
- I will share my public tools here and strive to keep them updated in the future. Don't forget to give them a star! Your support is apprec…☆72Feb 4, 2026Updated last month
- ☆20Aug 12, 2023Updated 2 years ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- web cache deception detect☆38Jan 9, 2026Updated last month
- Tools for bug bounty☆29Jul 9, 2025Updated 7 months ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- Quickly fetches files from Wayback Machine.☆74Oct 31, 2023Updated 2 years ago