semgrep / semgrep-rules
Semgrep rules registry
☆804Updated this week
Related projects ⓘ
Alternatives and complementary repositories for semgrep-rules
- Semgrep queries developed by Trail of Bits.☆329Updated 3 weeks ago
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆805Updated last year
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆695Updated 2 months ago
- grep rough audit - source code auditing tool☆1,535Updated 3 months ago
- ☆175Updated this week
- A collection of my Semgrep rules to facilitate vulnerability research.☆587Updated 4 months ago
- OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web…☆669Updated 3 months ago
- Fuzz test your application using your OpenAPI or Swagger API definition without coding☆429Updated 3 months ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆331Updated 7 months ago
- Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC) - Betterscan☆811Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆509Updated this week
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆803Updated 2 years ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆417Updated last year
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆458Updated 2 weeks ago
- Repo for all the OWASP-SKF Docker lab examples☆438Updated 3 months ago
- Global Security Database☆307Updated 6 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆355Updated 3 years ago
- GitHub Satellite 2020 workshops on finding security vulnerabilities with CodeQL for Java/JavaScript.☆207Updated last month
- Grammar-based HTTP/1 fuzzer with mutation ability☆243Updated last week
- An open source threat modeling tool from OWASP☆930Updated this week
- ☆654Updated 2 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆457Updated last year
- Tool for building Kubernetes attack paths☆772Updated 2 weeks ago
- A Pythonic framework for threat modeling☆917Updated 3 months ago
- How GitHub Actions workflows can be hacked☆104Updated 2 months ago
- A starter secure code review checklist☆178Updated 5 years ago
- Simple DNS Rebinding Service☆625Updated 4 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆626Updated last year
- ☆957Updated 10 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆855Updated this week