SARIF Explorer: A VSCode extension that helps you visualize and triage static analysis results
☆47Mar 13, 2026Updated last week
Alternatives and similar repositories for vscode-sarif-explorer
Users that are interested in vscode-sarif-explorer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Oct 25, 2021Updated 4 years ago
- ☆90Updated this week
- A collection of my weggli patterns to facilitate vulnerability research.☆155Mar 9, 2026Updated 2 weeks ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆36Feb 4, 2025Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆19Jun 6, 2024Updated last year
- Source code for ACM CCS 2020 Paper PMForce: Systematically Analyzing postMessage Handlers at Scale☆18May 17, 2021Updated 4 years ago
- Produce code coverage reports for AFL++ fuzzing campaigns with source code or in binary-only mode☆32Jul 18, 2025Updated 8 months ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 2 months ago
- Scripts or utilities for radare2☆15Sep 10, 2016Updated 9 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆48Dec 5, 2022Updated 3 years ago
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24May 1, 2025Updated 10 months ago
- Kaleidoscope plugin creating an LED 'LetterGuesser' effect.☆15Oct 21, 2017Updated 8 years ago
- To make fuzzing Rust easy☆199Updated this week
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- Find unmaintained packages in Rust projects☆87Mar 15, 2026Updated last week
- SAST + LLM Interprocedural Context Extractor☆191Oct 28, 2025Updated 4 months ago
- ℁ Retrieve your external IP address via DNS☆16Mar 3, 2023Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 4 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- Blog☆23Jun 27, 2023Updated 2 years ago
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆19Feb 13, 2026Updated last month
- Instruction decoder generator☆36May 5, 2025Updated 10 months ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- 🥷 Soothing pastel theme for Binary Ninja☆26Apr 22, 2025Updated 11 months ago
- SMT Modeling and Configurable Program Analysis for Ghidra's PCODE☆34Updated this week
- A Ghidra script that enables the analysis of selected functions and instructions using Large Language Models (LLMs). It aims to make reve…☆151Nov 29, 2024Updated last year
- Burp plugin for jxscout☆20May 12, 2025Updated 10 months ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Convert your HackerOne reports into reusable AI skills.☆73Mar 9, 2026Updated 2 weeks ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- ☆48Jul 30, 2025Updated 7 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 8 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆48Feb 22, 2026Updated last month