apiiro / malicious-code-rulesetLinks
Focused malicious code detection ruleset, with a high protection-to-noise ratio
☆123Updated 6 months ago
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below
Sorting:
- boostsecurityio/lotp☆132Updated 4 months ago
- ☆82Updated 6 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- ☆112Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 4 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆40Updated 8 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆134Updated 4 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆80Updated this week
- Gram is Klarna's own threat model diagramming tool☆323Updated 3 weeks ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆90Updated 3 months ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆30Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆41Updated last month
- ☆189Updated 4 months ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆116Updated 2 months ago
- A tool for preventing the installation of malicious npm and PyPI packages☆157Updated last week
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- A project to visualize the software supply chain☆52Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆33Updated 5 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated 2 years ago
- boostsecurityio/poutine☆309Updated last week
- Prevent merging of malicious code in pull requests☆230Updated 5 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated 2 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated 3 weeks ago
- AI featured threat modeling and security review action☆45Updated 9 months ago
- LLM Testing Findings Templates☆72Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆246Updated 4 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 6 months ago