wahyuhadi / semgrep-server-rules
☆18Updated 2 years ago
Alternatives and similar repositories for semgrep-server-rules:
Users that are interested in semgrep-server-rules are comparing it to the libraries listed below
- Learning source code review, spot vulnerability, find some ways how to fix it.☆26Updated 2 years ago
- Lab To Pratice Web Hacking☆25Updated 5 years ago
- Examples of different vulnerabilities, in a variety of languages, shapes and sizes.☆28Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 5 months ago
- Web Application Attack☆14Updated 5 years ago
- The First Open Source Bug Bounty Platform☆69Updated last week
- HackToday is annual ctf competition held by Cyber Security IPB☆17Updated 4 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆117Updated last year
- ☆17Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆21Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆39Updated 3 months ago
- Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)☆18Updated 3 years ago
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 2 years ago
- This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).☆16Updated 3 weeks ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Updated last year
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- A collection of my Semgrep rules☆48Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆102Updated 2 months ago
- ☆10Updated 6 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆23Updated 2 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆49Updated 3 years ago
- Vulnerable demo application for the race condition☆20Updated 3 years ago
- ☆15Updated 3 years ago
- Intentionally vulnerable Go web app.☆43Updated 2 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago
- ☆16Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated 3 weeks ago