8000 GitHub - falasi/gSAST: gSAST - Grep Static Analysis Security Tool
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

falasi/gSAST

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

gSAST - Grep Static Analysis Security Tool

gSAST (Grep Static Analysis Security Tool) is a tool developed for the OSWE certification, utilizing shell scripting (bash) to streamline the process of manual source code analysis.

gSAST Demo

For a comprehensive demonstration of gSAST, visit my website.

Note: Please be aware that gSAST is not a vulnerability scanner.

Usage

To use gSAST, simply provide the path to the directory containing the source code files you want to analyze and the programming language, and optionally the file extension:

gSAST.sh -l php -i "*.php" /path/to/source/code
cat list.txt | gSAST.sh -l php

FAQ

Can gSAST be used in the OSWE exam?

gSAST relies on the Linux grep utility and pattern files for static analysis, which technically could be used in the OSWE exam. However, it's essential to verify the current allowed toolset on the Offensive Security website as policies may change. Please refer to the "Exam Restrictions" section for the most up-to-date information.

About

gSAST - Grep Static Analysis Security Tool

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%
0