dropbox / bhaktiLinks
Bundle of security analysis scripts for keras tensorflow models
☆15Updated last year
Alternatives and similar repositories for bhakti
Users that are interested in bhakti are comparing it to the libraries listed below
Sorting:
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- Cybersecurity of Machine Learning and Artificial Intelligence☆69Updated 3 years ago
- OWASP Foundation Web Respository☆37Updated 3 months ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆92Updated 2 weeks ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 7 months ago
- ☆220Updated 3 weeks ago
- My custom semgrep rules☆22Updated 5 years ago
- ☆114Updated 2 years ago
- Action to retrofit a CodeQL bundle with additional queries, libraries, and customizations☆27Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- A project to visualize the software supply chain☆55Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 5 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 8 months ago
- using ML models for red teaming☆45Updated 2 years ago
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆46Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 2 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆192Updated last year
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆61Updated 8 months ago
- WAF bypass PoC☆50Updated 2 years ago
- Kubernetes Pwnage for all☆56Updated 5 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 10 months ago
- Welcome to `ai-secure-code-review`, a repository that integrates static analysis tools with Generative AI, specifically Semgrep and Azure…☆36Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆159Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆139Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆133Updated 3 weeks ago
- Rules for Bearer SAST☆36Updated last month
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago