Focused malicious code detection ruleset, with a high protection-to-noise ratio
☆146Feb 24, 2025Updated last year
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prevent merging of malicious code in pull requests☆259Jan 8, 2026Updated 4 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆24Apr 26, 2026Updated 3 weeks ago
- Scan GitHub Actions Workflow logs for IOCs☆17Updated this week
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- Dependency Combobulator☆96Jan 10, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Aug 29, 2023Updated 2 years ago
- Semgrep queries developed by Trail of Bits.☆508May 7, 2026Updated last week
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- ☆20Apr 10, 2025Updated last year
- A malware scanner with Yara and ClamAV binding☆12Updated this week
- ☆12Jan 9, 2023Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆507May 12, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆38Feb 28, 2025Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Static security checker for Dockerfiles☆105Jan 29, 2026Updated 3 months ago
- poutine, a supply chain vulnerability scanner for build pipelines☆452May 6, 2026Updated 2 weeks ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 5 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆42Aug 29, 2024Updated last year
- Extensible, open-source solution for automated file sandboxing and analysis☆31Updated this week
- AI Bill of Materials through source code scanning☆76May 5, 2026Updated 2 weeks ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- ☆46Mar 4, 2023Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- ☆87Mar 30, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Open Source Package Analysis☆883Updated this week
- A research project to add some brrrrrr to Burp☆210Feb 16, 2026Updated 3 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆283Apr 27, 2026Updated 3 weeks ago
- ☆114Jun 8, 2023Updated 2 years ago
- MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their ori…☆13May 10, 2023Updated 3 years ago
- auth0 elixir library☆16Updated this week
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆63Feb 5, 2025Updated last year