A collection of my Semgrep rules
☆51Jul 4, 2023Updated 2 years ago
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- ☆227Dec 18, 2025Updated 2 months ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆321Nov 12, 2025Updated 3 months ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- ☆28Dec 26, 2025Updated 2 months ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Semgrep queries developed by Trail of Bits.☆484Nov 12, 2025Updated 3 months ago
- ☆24Feb 12, 2016Updated 10 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- POSIX script for mail security checks of domain names☆76Jul 24, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated last month
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆798Feb 17, 2026Updated 2 weeks ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ☆19Dec 5, 2024Updated last year
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Sep 2, 2020Updated 5 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago