Collection of Semgrep rules for security analysis
☆10Mar 30, 2024Updated last year
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- ☆14Dec 26, 2022Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆23Jan 5, 2026Updated last month
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- ☆22Mar 1, 2022Updated 4 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Jan 4, 2026Updated 2 months ago
- ☆25Nov 2, 2021Updated 4 years ago
- Semgrep queries developed by Trail of Bits.☆482Nov 12, 2025Updated 3 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆42Dec 3, 2025Updated 3 months ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Dec 12, 2024Updated last year
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- Claroty's Public Tools☆39Mar 11, 2020Updated 5 years ago
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Mar 15, 2020Updated 5 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- Like the British said☆12Nov 15, 2023Updated 2 years ago