semgrep-rules
Semgrep rules registry (by semgrep)
semgrep-rules | apache-log4j-rce-poc | |
---|---|---|
8 | 1 | |
707 | 2 | |
1.1% | - | |
9.4 | 0.0 | |
5 days ago | over 2 years ago | |
Solidity | Java | |
GNU General Public License v3.0 or later | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
semgrep-rules
Posts with mentions or reviews of semgrep-rules.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-06-21.
-
Powerful SAST project for Android Application Security
Nice and all, but why not contribute to https://github.com/returntocorp/semgrep-rules ?
-
Semgrep - Beta support for Rust
Well, the rules they actually added are pretty noisy. There's also not a lot of them.
-
Spring Actuator - Finding Actuators using Static Code Analysis - Part 2
The semgrep registry contains lots of rules for many issues, and you can contribute your own.
-
Just Say No To `:Latest`
Hadolint is great! If you want to customize your lint logic beyond the checks in it, I recently wrote a Semgrep rule to require all our Dockerfiles to pin images with a sha256 hash that could be a good starting point: https://github.com/returntocorp/semgrep-rules/pull/1861/file...
-
RCE 0-day exploit found in log4j, a popular Java logging package
Semgrep Rules for searching source code
-
Hacktoberfest and open-source security
Interested? More details are in this Hacktoberfest README.
- Semgrep rules registry: 1300 linter rules
apache-log4j-rce-poc
Posts with mentions or reviews of apache-log4j-rce-poc.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-12-09.
-
RCE 0-day exploit found in log4j, a popular Java logging package
I published some code with detailed steps 写了下详细的复现步骤 https://github.com/udoless/apache-log4j-rce-poc
What are some alternatives?
When comparing semgrep-rules and apache-log4j-rce-poc you can also consider the following projects:
find-sec-bugs - The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
Log4jAttackSurface
CVE-2021-44228-Log4Shell-Hashes - Hashes for vulnerable LOG4J versions
active-scan-plus-plus - ActiveScan++ Burp Suite Plugin
ZAP - The ZAP core project
Log4JShell-Bytecode-Detector - Local Bytecode Scanner for the Log4JShell Vulnerability (CVE-2021-44228)
pyre-check - Performant type-checking for python.
apache-log4j-rce-poc
ThreatMapper - Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.
semgrep-rules vs find-sec-bugs
apache-log4j-rce-poc vs Log4jAttackSurface
semgrep-rules vs CVE-2021-44228-Log4Shell-Hashes
apache-log4j-rce-poc vs active-scan-plus-plus
semgrep-rules vs ZAP
apache-log4j-rce-poc vs Log4JShell-Bytecode-Detector
semgrep-rules vs pyre-check
apache-log4j-rce-poc vs apache-log4j-rce-poc
semgrep-rules vs Log4JShell-Bytecode-Detector
apache-log4j-rce-poc vs CVE-2021-44228-Log4Shell-Hashes
semgrep-rules vs ThreatMapper
apache-log4j-rce-poc vs ThreatMapper