Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages
☆261Apr 9, 2026Updated last week
Alternatives and similar repositories for supply-chain-firewall
Users that are interested in supply-chain-firewall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- ☆18Jul 30, 2024Updated last year
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,058Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆333Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- Generate datasets of cloud audit logs for common attacks☆236Apr 6, 2026Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Apr 5, 2026Updated last week
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆356Updated this week
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆505Mar 6, 2026Updated last month
- Scan GitHub Actions Workflow logs for IOCs☆17Apr 10, 2026Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- #supply #chain #attack #detection☆649Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- SDLC evidence store and policy engine for your Software Supply Chain attestations, SBOMs, VEX, SARIF, QA reports, and more☆543Updated this week
- AWS audits, without screenshots☆30Apr 10, 2026Updated last week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆491Updated this week
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated 2 months ago
- ☆149Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- ☆46Nov 7, 2024Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆143Jan 28, 2026Updated 2 months ago
- ☆192Apr 16, 2025Updated last year
- Security tool against dependency typosquatting attacks☆55Updated this week
- ☆116Feb 11, 2026Updated 2 months ago
- ☆36Apr 29, 2025Updated 11 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆146Jan 28, 2024Updated 2 years ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AWS honey token manager☆90Aug 1, 2024Updated last year
- ☆80Dec 10, 2025Updated 4 months ago
- Open Source Package Analysis☆874Feb 27, 2026Updated last month
- Scan your account for the use of untrusted AMIs☆32Apr 6, 2026Updated last week
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆190Updated this week
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Oct 13, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month