patched-codes / semgrep-rules
A collection of permissively licensed Semgrep rules.
β10Updated 10 months ago
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- Manager of third-party sources of Semgrep rules πβ82Updated 9 months ago
- Maturity Model Collaborative projectβ15Updated 2 years ago
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β39Updated 5 months ago
- Collection of Semgrep rules for security analysisβ10Updated last year
- My collection of Semgrep rules for vulnerability detection on source code (swift, java)β34Updated last year
- DefectDojo Community Contentβ18Updated 7 months ago
- Custom semgrep rules registryβ12Updated 2 years ago
- FastCVE - fast, rich and API-based search for CVE and more (CPE, CWE, CAPEC)β50Updated this week
- Focused malicious code detection ruleset, with a high protection-to-noise ratioβ118Updated 2 months ago
- Code Pathfinder, the open-source alternative to GitHub CodeQL built with GoLang. Built for advanced structural search, derive insights, fβ¦β59Updated 2 weeks ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.β22Updated 3 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.β40Updated this week
- A community collection of security reviews of open source software components.β93Updated last year
- Fork Threat Modeling Platform - Communityβ19Updated last month
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated 2 years ago
- β10Updated 3 years ago
- A wrapper around jq, to help you parse jq output!β30Updated 4 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).β28Updated 3 months ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.β19Updated 2 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS dataβ27Updated last year
- Static Token And Credential Scannerβ96Updated 2 years ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installsβ51Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and versβ¦β118Updated 2 weeks ago
- AXFR all the things!β26Updated 4 months ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.β13Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β41Updated last year
- Dragon-GPT uses Chat-GPT, or local LLM, to execute automatic and AI-powered threat modeling analysis on a given OWASP Threat Dragon diagrβ¦β35Updated 2 months ago
- β17Updated this week
- Database interaction layer to store open-asset-models in sqlite3 and postgresβ18Updated this week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.β65Updated this week