tuannq2299 / semgrep-rulesView external linksLinks
A collection of Semgrep rules which followed security guidelines for .NET and Java.
☆23Oct 4, 2021Updated 4 years ago
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- ☆226Dec 18, 2025Updated last month
- A collection of permissively licensed Semgrep rules.☆22Jul 5, 2024Updated last year
- Julia rules for semgrep☆14Dec 9, 2025Updated 2 months ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of h…☆72Feb 27, 2025Updated 11 months ago
- ☆18Dec 20, 2025Updated last month
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- This changes the style of Burp Suite's Repeater tabs to help the testers☆29Jul 3, 2019Updated 6 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 6 months ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- Semgrep queries developed by Trail of Bits.☆474Nov 12, 2025Updated 3 months ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆41Dec 3, 2025Updated 2 months ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated 2 weeks ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- ☆11Jul 10, 2024Updated last year
- Posts about different topics☆39Aug 18, 2025Updated 5 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆779Jan 27, 2026Updated 2 weeks ago
- ☆12Sep 18, 2015Updated 10 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- ☆13Dec 28, 2024Updated last year
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- TP-Framework: Testability Pattern Framework for SAST☆15May 10, 2024Updated last year
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- ☆13Dec 3, 2022Updated 3 years ago
- TWRP device tree for 2021 Samsung Galaxy Tab A8 10.5 [SM-X200]☆11Aug 8, 2023Updated 2 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- ☆11Jun 22, 2020Updated 5 years ago