☆227Dec 18, 2025Updated 2 months ago
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,085Updated this week
- Semgrep queries developed by Trail of Bits.☆484Nov 12, 2025Updated 3 months ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆798Feb 17, 2026Updated 2 weeks ago
- Link sources to sinks in C# applications.☆150Apr 10, 2023Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 9 months ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆321Nov 12, 2025Updated 3 months ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆101Dec 24, 2025Updated 2 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 5 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆277Sep 20, 2024Updated last year
- ☆18Dec 20, 2025Updated 2 months ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆406Dec 24, 2022Updated 3 years ago
- JMX enumeration and attacking tool.☆493Jun 26, 2025Updated 8 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Oct 26, 2024Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆446Sep 7, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆283Nov 27, 2025Updated 3 months ago
- ☆15Oct 25, 2021Updated 4 years ago
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆723Updated this week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Sep 11, 2025Updated 5 months ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,344Aug 6, 2025Updated 6 months ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Tools to assess the DNS security of web applications☆127Oct 5, 2022Updated 3 years ago
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- grep rough audit - source code auditing tool☆1,679Dec 19, 2025Updated 2 months ago
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology …☆814Jun 9, 2025Updated 8 months ago