dropbox / bhaktiLinks
Bundle of security analysis scripts for keras tensorflow models
β15Updated last year
Alternatives and similar repositories for bhakti
Users that are interested in bhakti are comparing it to the libraries listed below
Sorting:
- A collection of Semgrep rules which followed security guidelines for .NET and Java.β23Updated 4 years ago
- Manager of third-party sources of Semgrep rules πβ90Updated last year
- β206Updated 3 weeks ago
- OWASP Foundation Web Respositoryβ37Updated 2 months ago
- Cybersecurity of Machine Learning and Artificial Intelligenceβ69Updated 3 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β137Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ106Updated 10 months ago
- Blogpost series showcasing interesting cloud - web app security bugsβ50Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.β89Updated 6 months ago
- Action to retrofit a CodeQL bundle with additional queries, libraries, and customizationsβ27Updated last year
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and versβ¦β132Updated this week
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.β45Updated last year
- β114Updated 2 years ago
- XBOW Validation Benchmarksβ370Updated 5 months ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)β61Updated 7 months ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β140Updated last month
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 5 years ago
- A collection of my Semgrep rulesβ50Updated 2 years ago
- using ML models for red teamingβ44Updated 2 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agentsβ66Updated 7 months ago
- My custom semgrep rulesβ22Updated 5 years ago
- Find CVE PoCs on GitHubβ156Updated 4 months ago
- A guided mutation-based fuzzer for ML-based Web Application Firewallsβ194Updated last year
- Kubernetes Pwnage for allβ56Updated 5 years ago
- Static Token And Credential Scannerβ95Updated 2 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chainβ96Updated 10 months ago
- A project to visualize the software supply chainβ55Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environmentβ84Updated 10 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebasβ¦β155Updated last year