Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX
☆19Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for GreedyForSQLi
Users that are interested in GreedyForSQLi are comparing it to the libraries listed below
Sorting:
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆46Jan 15, 2026Updated 2 months ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- NIVA is a simple web application which is intentionally vulnerable to NoSQL injection. The purpose of this project is to facilitate a bet…☆19Nov 21, 2022Updated 3 years ago
- ☆16Sep 20, 2023Updated 2 years ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆51Updated this week
- semgrep rules for flakiness, missed error handling, Lua antipatterns and pitfalls.☆18Nov 1, 2024Updated last year
- A POC for better exception reporting for futures☆12Aug 20, 2014Updated 11 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 2 months ago
- Markdown internal & external links validation library and CLI☆11Jul 16, 2019Updated 6 years ago
- Common Play Json implicits and helper methods☆15Aug 14, 2023Updated 2 years ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- Start Linux programs with only selected syscalls enabled (libseccomp-based)☆24Jan 23, 2017Updated 9 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- Generate parsers from tree-sitter grammars extended to support Semgrep patterns☆13Updated this week
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Searching Go code with a graph database☆27Jun 24, 2022Updated 3 years ago
- xargs for semgrep☆29Mar 27, 2024Updated last year
- Payload generator to exfiltrate user cookies through the PHP info page bypassing the HttpOnly flag during XSS exploitation.☆20Dec 20, 2023Updated 2 years ago
- A simple python platform to perform analyses on facebook messenger conversations☆10Dec 11, 2023Updated 2 years ago
- HTB writeup downloader☆24Aug 11, 2022Updated 3 years ago
- A set of UI components to help you integrate Orama on your website or app.☆17Jun 19, 2025Updated 9 months ago
- Bruno Nightly Release Builds☆11Updated this week
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of h…☆73Feb 27, 2025Updated last year
- Server prepared for SSRF post exploitation, javascript exploits and open redirect.☆13Jan 4, 2023Updated 3 years ago
- A lightweight linting framework designed for complex applications using a mix of third-party linters and custom rules.☆26Jan 9, 2026Updated 2 months ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Jul 11, 2023Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- ☆17Sep 13, 2025Updated 6 months ago
- Cypress DOM snapshots and consistent image diffing in the cloud☆14Updated this week
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆69Feb 5, 2026Updated last month