apiiro / malicious-code-rulesetLinks
Focused malicious code detection ruleset, with a high protection-to-noise ratio
☆122Updated 4 months ago
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below
Sorting:
- boostsecurityio/lotp☆128Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆136Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆31Updated 4 months ago
- ☆111Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆87Updated 11 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- Nuclei plugins to audit Chrome extensions☆65Updated 11 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆207Updated this week
- ☆75Updated 5 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 7 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 5 months ago
- ☆185Updated 2 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆40Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated 10 months ago
- LLM Testing Findings Templates☆72Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- AI featured threat modeling and security review action☆44Updated 7 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆24Updated last year
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- A full insecure kubernetes application for testing security tools☆89Updated 2 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 6 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆237Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 5 months ago
- ☆36Updated 11 months ago