apiiro / malicious-code-rulesetLinks
Focused malicious code detection ruleset, with a high protection-to-noise ratio
β120Updated 4 months ago
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below
Sorting:
- boostsecurityio/lotpβ126Updated 2 months ago
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β39Updated 6 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ89Updated last month
- Manager of third-party sources of Semgrep rules πβ87Updated 11 months ago
- β71Updated 4 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β41Updated last year
- β111Updated 2 years ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β133Updated 2 months ago
- β36Updated 10 months ago
- Security tool against dependency typosquatting attacksβ52Updated this week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ105Updated 4 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β135Updated last year
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β55Updated 4 months ago
- Prevent merging of malicious code in pull requestsβ225Updated 3 months ago
- Semgrep-based Policy Controller for Kubernetesβ47Updated 2 months ago
- Nuclei plugins to audit Chrome extensionsβ64Updated 11 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ30Updated 3 months ago
- β184Updated 2 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS dataβ27Updated last year
- Protect against subdomain takeoverβ92Updated last year
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilitβ¦β15Updated 2 weeks ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ141Updated 5 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β47Updated 10 months ago
- A project to visualize the software supply chainβ51Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ61Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β108Updated 7 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.β21Updated 3 months ago
- Burp Suite extension for testing Passkey systems.β69Updated 2 months ago
- InfoSec OpenAI Examplesβ19Updated last year