DataDog / malicious-software-packages-datasetLinks
An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.
☆214Updated this week
Alternatives and similar repositories for malicious-software-packages-dataset
Users that are interested in malicious-software-packages-dataset are comparing it to the libraries listed below
Sorting:
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆322Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆77Updated 2 weeks ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆122Updated this week
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆171Updated this week
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆778Updated 2 weeks ago
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆325Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆148Updated last year
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆364Updated 7 months ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 2 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆123Updated 5 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 5 months ago
- Feed parsing for language package manager updates☆79Updated 8 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- Open Source Vulnerability schema.☆205Updated this week
- Collection of tools for analyzing open source packages.☆350Updated last week
- Global Security Database☆319Updated last year
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆71Updated last week
- boostsecurityio/lotp☆130Updated 3 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆127Updated 2 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆97Updated 3 months ago
- A tool for preventing the installation of malicious npm and PyPI packages☆153Updated this week
- A very simple open source implementation of Google's Project Naptime☆161Updated 4 months ago
- A comprehensive list of software composition analysis tools.☆151Updated last year
- A repo to conduct vulnerability enrichment.☆662Updated this week
- Gram is Klarna's own threat model diagramming tool☆322Updated last week
- Secure Jupyter Notebooks and Experimentation Environment☆78Updated 5 months ago
- ☆79Updated 6 months ago