My custom semgrep rules
☆23Sep 13, 2020Updated 5 years ago
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆42Dec 3, 2025Updated 3 months ago
- Tao(道)一款用于java语言函数调用关系生成的工具,致力于提高java代码审计效率。☆11Jul 2, 2024Updated last year
- Java ☕ reverse engineering tool - Batch decompile the jar package.☆10Feb 14, 2023Updated 3 years ago
- Easy fuzzing with go-fuzz☆14Apr 10, 2020Updated 5 years ago
- ☆10Jul 21, 2022Updated 3 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- semgrep rules for flakiness, missed error handling, Lua antipatterns and pitfalls.☆17Nov 1, 2024Updated last year
- ☆227Dec 18, 2025Updated 2 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆48Updated this week
- javaGGC for generate commons.collections gadget chain☆12Nov 10, 2021Updated 4 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16May 28, 2022Updated 3 years ago
- CVE-2023-52251 There is a Remote Code Execution vulnerability provectus/kafka-ui.☆20Jan 23, 2024Updated 2 years ago
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Feb 21, 2026Updated last week
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- Confluence未授权添加管理员用户漏洞利用脚本☆25Oct 26, 2023Updated 2 years ago
- ☆55May 30, 2017Updated 8 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- arl_files备份项目☆24May 17, 2024Updated last year
- 调用Acunetix AWVS的API实现批量扫描,并且使用代理池,实现批量扫描时的每个扫描目标都使用不同的代理IP。提供常驻后台监控功能,控制最 大扫描任务数量以及最大扫描时间☆23Nov 24, 2022Updated 3 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- Semgrep queries developed by Trail of Bits.☆484Nov 12, 2025Updated 3 months ago
- Minhash LSH in Golang☆27Sep 24, 2019Updated 6 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Moved to https://github.com/AthenZ/authorization-proxy☆35Dec 20, 2022Updated 3 years ago
- ☆24Apr 10, 2023Updated 2 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- The function of the tool is to inject JNDI through LDAP☆28Dec 21, 2021Updated 4 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- Expelee offers comprehensive code reviews for teams that are preparing to launch their blockchain applications. We scan for security vuln…☆10Jan 25, 2026Updated last month
- https://github.com/eclipse/jgit/blob/master/Documentation/technical/reftable.md☆37Dec 2, 2020Updated 5 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago