Focused malicious code detection ruleset, with a high protection-to-noise ratio
☆143Feb 24, 2025Updated last year
Alternatives and similar repositories for malicious-code-ruleset
Users that are interested in malicious-code-ruleset are comparing it to the libraries listed below
Sorting:
- Prevent merging of malicious code in pull requests☆253Jan 8, 2026Updated last month
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 10 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- Scan GitHub Actions Workflow logs for IOCs☆16Updated this week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Feb 28, 2025Updated last year
- GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environm…☆20Aug 29, 2023Updated 2 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆462Updated this week
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- ☆12Mar 24, 2018Updated 7 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Semgrep queries developed by Trail of Bits.☆482Nov 12, 2025Updated 3 months ago
- ☆14Jan 8, 2026Updated last month
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆12Jan 9, 2023Updated 3 years ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Jan 20, 2026Updated last month
- ☆20Apr 10, 2025Updated 10 months ago
- ☆18Jul 30, 2024Updated last year
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- ☆227Dec 18, 2025Updated 2 months ago
- ☆16Jul 14, 2023Updated 2 years ago
- boostsecurityio/poutine☆367Updated this week
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Detection scripts for MDM deployment to identify OpenClaw installations on managed devices.☆63Feb 5, 2026Updated 3 weeks ago
- ☆14Jun 28, 2017Updated 8 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆215Updated this week
- ☆114Jun 8, 2023Updated 2 years ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Open Source Package Analysis☆863Apr 16, 2025Updated 10 months ago
- Advanced Shodan-based scanner for discovering, verifying, and enumerating Model Context Protocol (MCP) servers and AI infrastructure tool…☆33Jan 3, 2026Updated last month