vineethsai / vulnerablemcpLinks
☆30Updated 5 months ago
Alternatives and similar repositories for vulnerablemcp
Users that are interested in vulnerablemcp are comparing it to the libraries listed below
Sorting:
- using ML models for red teaming☆45Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 11 months ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated last year
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules 🗂☆94Updated 2 weeks ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 4 years ago
- https://arxiv.org/abs/2412.02776☆67Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆35Updated 10 months ago
- Data Scientists Go To Jupyter☆68Updated 10 months ago
- A collection of my Semgrep rules☆50Updated 2 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated this week
- An extension to use Semgrep inside Burp Suite.☆89Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆128Updated last week
- ☆116Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated last week
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 10 months ago
- Dependency Combobulator☆95Updated 2 years ago
- Data about all known supply-chain attacks through history☆63Updated 7 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- ☆21Updated 4 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆67Updated 8 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆27Updated last month
- Payloads for Attacking Large Language Models☆116Updated 7 months ago
- ☆71Updated last month