dropbox / bhaktiLinks
Bundle of security analysis scripts for keras tensorflow models
β14Updated last year
Alternatives and similar repositories for bhakti
Users that are interested in bhakti are comparing it to the libraries listed below
Sorting:
- Manager of third-party sources of Semgrep rules πβ87Updated 11 months ago
- OWASP Foundation Web Respositoryβ36Updated 10 months ago
- β197Updated 8 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.β23Updated 3 years ago
- Cybersecurity of Machine Learning and Artificial Intelligenceβ73Updated 3 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β135Updated last year
- Blogpost series showcasing interesting cloud - web app security bugsβ49Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 4 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and versβ¦β121Updated this week
- β111Updated 2 years ago
- Kubernetes Pwnage for allβ57Updated 4 years ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β133Updated 3 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ105Updated 5 months ago
- Secure Jupyter Notebooks and Experimentation Environmentβ76Updated 5 months ago
- An extension to use Semgrep inside Burp Suite.β89Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebasβ¦β148Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.β212Updated this week
- Static Token And Credential Scannerβ96Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshopsβ184Updated last year
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated 2 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chainβ96Updated 5 months ago
- A comprehensive list of software composition analysis tools.β152Updated last year
- LLM Testing Findings Templatesβ72Updated last year
- Action to retrofit a CodeQL bundle with additional queries, libraries, and customizationsβ26Updated last year
- My custom semgrep rulesβ21Updated 4 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratioβ122Updated 4 months ago
- Damn Vulnerable Java (EE) Applicationβ139Updated last year
- using ML models for red teamingβ43Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responsesβ111Updated 2 years ago
- XBOW Validation Benchmarksβ168Updated last month