This repository contains Cursor Security Rules designed to improve the security of both development workflows and AI agent usage within the Cursor environment. These rules aim to enforce safe coding practices, control sensitive operations, and reduce risk in AI-assisted development.
☆368Aug 27, 2025Updated 6 months ago
Alternatives and similar repositories for cursor-security-rules
Users that are interested in cursor-security-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Baseline rules files to improve the security of AI-generated code (Claude, Cursor, Copilot + more)☆231Dec 23, 2025Updated 3 months ago
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- ☆20Apr 10, 2025Updated 11 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 9 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- ☆39Jul 1, 2025Updated 8 months ago
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- ☆72Oct 24, 2025Updated 4 months ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆220Updated this week
- ☆40Aug 2, 2024Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 11, 2026Updated last week
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Specification 1 (hierarchical style) for an agentic software development crew, for implementation with mainstream Agentic platforms like…☆23Mar 13, 2026Updated last week
- ☆23Jun 18, 2025Updated 9 months ago
- AI-Powered Web Attack Surface Enumeration☆34Feb 5, 2026Updated last month
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 14, 2026Updated last week
- ☆18Feb 2, 2026Updated last month
- A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Cal…☆256Jun 10, 2025Updated 9 months ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated 2 months ago
- A simple AI developer agent☆23Jul 21, 2025Updated 8 months ago
- Automated web vulnerability scanning with LLM agents☆457Jun 18, 2025Updated 9 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- Turn Claude Code into a coordinated team of 40+ specialized AI agents that work together like a world-class engineering organization.☆47Updated this week
- ☆192Apr 16, 2025Updated 11 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Transform Claude Code transcript JSONL files into readable terminal and HTML formats.☆70Feb 10, 2026Updated last month
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated last month
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated last month
- rins_hooks - Never lose track of your Claude Code changes again. Automatically commits every edit with context, so you can code fearlessl…☆106Aug 17, 2025Updated 7 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 6 months ago
- ☆381Sep 20, 2025Updated 6 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago