Focused malicious code detection ruleset, with a high protection-to-noise ratio
☆143Feb 24, 2025Updated last year
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below
Sorting:
- Prevent merging of malicious code in pull requests☆253Jan 8, 2026Updated 2 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- Scan GitHub Actions Workflow logs for IOCs☆16Updated this week
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Aug 29, 2023Updated 2 years ago
- Semgrep queries developed by Trail of Bits.☆485Nov 12, 2025Updated 4 months ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- ☆12Jan 9, 2023Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆470Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- boostsecurityio/poutine☆385Mar 10, 2026Updated last week
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆16Jul 14, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Aug 29, 2024Updated last year
- Extensible, open-source solution for automated file sandboxing and analysis☆27Updated this week
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- ☆229Dec 18, 2025Updated 3 months ago
- ☆46Mar 4, 2023Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- ☆86Feb 4, 2026Updated last month
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆218Mar 13, 2026Updated last week
- Open Source Package Analysis☆866Feb 27, 2026Updated 3 weeks ago
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- ☆14Jun 28, 2017Updated 8 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their ori…☆13May 10, 2023Updated 2 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,134Updated this week
- auth0 elixir library☆16Updated this week
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Build your own cloud virtual machine lab☆13Nov 25, 2025Updated 3 months ago