tuannq2299 / semgrep-rules
A collection of Semgrep rules which followed security guidelines for .NET and Java.
☆22Updated 3 years ago
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- A collection of my Semgrep rules☆49Updated last year
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 2 months ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆17Updated last year
- Manager of third-party sources of Semgrep rules 🗂☆82Updated 9 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 5 months ago
- TheThing: an open-source tool to detect DOM Clobbering vulnerabilities☆47Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- ☆18Updated 2 months ago
- Additional active scan checks for BURP☆27Updated 7 months ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- My custom semgrep rules☆21Updated 4 years ago
- ☆94Updated 3 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆104Updated 3 months ago
- ☆14Updated 5 months ago
- Proof of Concepts for unsafe deserialization in Ruby☆16Updated 7 months ago
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆16Updated last year
- ☆44Updated 4 years ago
- ☆192Updated 6 months ago
- A curated list of argument injection vectors☆41Updated 3 months ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆59Updated last week
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 8 months ago
- jws2pubkey tool☆38Updated 11 months ago
- Utility for creating ZipSlip archives☆72Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 3 months ago
- ☆16Updated 3 years ago