s0rcy / semgrep-rules
Collection of Semgrep rules for security analysis
☆10Updated last year
Alternatives and similar repositories for semgrep-rules:
Users that are interested in semgrep-rules are comparing it to the libraries listed below
- Zone transfers for rwhois☆20Updated 6 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆17Updated 2 years ago
- ☆10Updated 6 years ago
- ☆14Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆11Updated 3 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 months ago
- ☆22Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- ☆18Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆26Updated 2 years ago
- Deployment code for ashirt-server☆19Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- ☆57Updated last year
- Pythonize Intruder Payload☆13Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago