trailofbits / testing-handbookLinks
Trail of Bits Testing Handbook - appsec.guide
☆92Updated last week
Alternatives and similar repositories for testing-handbook
Users that are interested in testing-handbook are comparing it to the libraries listed below
Sorting:
- CodeQL queries developed by Trail of Bits☆144Updated 3 weeks ago
- SAST + LLM Interprocedural Context Extractor☆176Updated 3 months ago
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆97Updated last month
- Create code bookmarks and code highlights with a click.☆226Updated last week
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- Automatically fuzz Rust projects from scratch☆59Updated 6 months ago
- ☆52Updated last year
- Resources for Browser Security Research☆53Updated 3 years ago
- CQ, a code security scanner☆99Updated last year
- 🔍A cutting edge context aware GraphQL API fuzzing tool!☆156Updated this week
- SARIF Explorer: A VSCode extension that helps you visualize and triage static analysis results☆44Updated last month
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆141Updated 3 months ago
- A coverage-guided REST API fuzzer developed on top of LibAFL☆160Updated last week
- A structure-aware HTTP fuzzing library☆217Updated 3 weeks ago
- Automatic Exploit Generation with LLMs☆499Updated last week
- Semgrep queries developed by Trail of Bits.☆471Updated 2 months ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆42Updated last year
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated last week
- A curated list of awesome browser security learning material.☆147Updated 3 years ago
- ☆131Updated 5 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆89Updated 2 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆84Updated this week
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- A very simple open source implementation of Google's Project Naptime☆184Updated 10 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- How GitHub Actions workflows can be hacked☆176Updated last year
- A web CTF for training developers in bug hunting and secure coding!☆100Updated last year
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆68Updated 11 months ago
- ☆156Updated 5 months ago
- ☆22Updated 2 months ago