akabe1 / akabe1-semgrep-rules
My collection of Semgrep rules for vulnerability detection on source code (swift, java)
☆33Updated last year
Alternatives and similar repositories for akabe1-semgrep-rules:
Users that are interested in akabe1-semgrep-rules are comparing it to the libraries listed below
- A collection of my Semgrep rules☆48Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- ☆17Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 3 weeks ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆32Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 2 weeks ago
- ☆90Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- OAuth 2.0 Dynamic Security Scanner☆32Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆23Updated last year
- Static Token And Credential Scanner☆96Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- A web security research tool for DOM testing☆19Updated this week
- ☆11Updated 2 years ago
- Additional active scan checks for BURP☆26Updated 5 months ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 2 years ago
- PoC's and Slides from 'Gophers, whales and.. clouds? Oh my!' BSides Wellington presentation by Glenn 'devalias' Grant☆15Updated 7 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 6 months ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- Validate proxies for specific domain☆35Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆64Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago