semgrep-old / rules-owasp-asvsView external linksLinks
Semgrep rules corresponding to the OWASP ASVS standard
☆27Nov 2, 2020Updated 5 years ago
Alternatives and similar repositories for rules-owasp-asvs
Users that are interested in rules-owasp-asvs are comparing it to the libraries listed below
Sorting:
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- BurpSuite extension that helps find user input in a GWT body.☆12May 29, 2020Updated 5 years ago
- Use ORT in your GitLab pipelines☆15Nov 11, 2025Updated 3 months ago
- ☆124Nov 8, 2023Updated 2 years ago
- ☆14Sep 30, 2020Updated 5 years ago
- Curated Collection of Popular Community Rules for Semgrep☆19Dec 27, 2023Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- ☆18Apr 21, 2020Updated 5 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- ☆32May 22, 2023Updated 2 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- A Burp Suite extension which performs checks for cross-domain scripting against the DOM, subresource integrity checks, and evaluates Java…☆26Mar 23, 2022Updated 3 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆1,072Feb 8, 2026Updated last week
- Bypass Constrained Language Mode in PowerShell☆30May 21, 2019Updated 6 years ago
- Rules for Bearer SAST☆36Nov 18, 2025Updated 2 months ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- ☆35Mar 8, 2022Updated 3 years ago
- ☆35May 13, 2021Updated 4 years ago
- Semgrep queries developed by Trail of Bits.☆474Nov 12, 2025Updated 3 months ago
- Monitoring for leaks of sensitive information in git repositories☆43Dec 18, 2023Updated 2 years ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆100Dec 24, 2025Updated last month
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Veracode security scanning build extension for Visual Studio Team Services☆14Mar 8, 2016Updated 9 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago