DataDog / malicious-software-packages-dataset
An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.
☆140Updated this week
Related projects ⓘ
Alternatives and complementary repositories for malicious-software-packages-dataset
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆254Updated this week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆126Updated 9 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆71Updated 3 weeks ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.0, purl, and vers…☆98Updated this week
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆113Updated this week
- Open Source Vulnerability schema.☆185Updated this week
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆62Updated last month
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆67Updated 6 months ago
- ☆46Updated this week
- Bundle of security analysis scripts for keras tensorflow models☆10Updated 7 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆126Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆76Updated 3 months ago
- ☆74Updated this week
- A fork of Bandit tool with patterns to identifying malicious python code.☆22Updated 2 years ago
- Scan pypi for typosquatting☆37Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆86Updated 9 months ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆52Updated this week
- boostsecurityio/lotp☆101Updated 7 months ago
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆288Updated last year
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆135Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆141Updated 8 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆131Updated last year
- Collection of tools for analyzing open source packages.☆317Updated this week
- PyPI malware packages☆58Updated 5 years ago
- Stakeholder-Specific Vulnerability Categorization☆129Updated this week
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆113Updated last year
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆57Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- Feed parsing for language package manager updates☆71Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year