Focused malicious code detection ruleset, with a high protection-to-noise ratio
☆144Feb 24, 2025Updated last year
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prevent merging of malicious code in pull requests☆255Jan 8, 2026Updated 3 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Updated this week
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- Dependency Combobulator☆96Jan 10, 2024Updated 2 years ago
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Aug 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Semgrep queries developed by Trail of Bits.☆493Nov 12, 2025Updated 4 months ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 11 months ago
- ☆12Jan 9, 2023Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆486Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- Static security checker for Dockerfiles☆104Jan 29, 2026Updated 2 months ago
- poutine, a supply chain vulnerability scanner for build pipelines☆404Updated this week
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- ☆16Jul 14, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Extensible, open-source solution for automated file sandboxing and analysis☆28Updated this week
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- ☆229Dec 18, 2025Updated 3 months ago
- ☆46Mar 4, 2023Updated 3 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- ☆87Mar 30, 2026Updated last week
- Open Source Package Analysis☆872Feb 27, 2026Updated last month
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆255Apr 1, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- ☆14Jun 28, 2017Updated 8 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their ori…☆13May 10, 2023Updated 2 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆53Feb 16, 2026Updated last month
- auth0 elixir library☆16Updated this week
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,162Updated this week