DataDog / malicious-software-packages-dataset
An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.
☆204Updated this week
Alternatives and similar repositories for malicious-software-packages-dataset
Users that are interested in malicious-software-packages-dataset are comparing it to the libraries listed below
Sorting:
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆309Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆118Updated 2 weeks ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated 2 weeks ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆88Updated last week
- Feed parsing for language package manager updates☆79Updated 5 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- A fork of Bandit tool with patterns to identifying malicious python code.☆25Updated 2 years ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆740Updated this week
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆118Updated 2 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆158Updated this week
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆319Updated 2 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆65Updated last week
- Open Source Vulnerability schema.☆200Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆272Updated this week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆358Updated 5 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆128Updated 2 years ago
- boostsecurityio/lotp☆125Updated last month
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆93Updated 3 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- A tool for preventing the installation of malicious PyPI and npm packages☆143Updated last week
- Collection of tools for analyzing open source packages.☆336Updated last week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago
- Gram is Klarna's own threat model diagramming tool☆320Updated 2 weeks ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 5 months ago
- A very simple open source implementation of Google's Project Naptime☆142Updated last month
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆124Updated 2 years ago
- Enrich SBOMs with data from third party services☆172Updated last month
- ☆64Updated 3 months ago