Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages
☆224Mar 17, 2026Updated last week
Alternatives and similar repositories for supply-chain-firewall
Users that are interested in supply-chain-firewall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- ☆18Jul 30, 2024Updated last year
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,024Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆316Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- Generate datasets of cloud audit logs for common attacks☆235Mar 17, 2026Updated last week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆348Mar 10, 2026Updated 2 weeks ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆495Mar 6, 2026Updated 2 weeks ago
- Scan GitHub Actions Workflow logs for IOCs☆16Mar 16, 2026Updated last week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- AWS audits, without screenshots☆29Mar 18, 2026Updated last week
- #supply #chain #attack #detection☆646Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Mar 17, 2026Updated last week
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- SDLC evidence store and policy engine for your Software Supply Chain attestations, SBOMs, VEX, SARIF, QA reports, and more☆537Mar 20, 2026Updated last week
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆135Jan 28, 2026Updated last month
- ☆147Mar 19, 2026Updated last week
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆473Updated this week
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- ☆46Nov 7, 2024Updated last year
- ☆192Apr 16, 2025Updated 11 months ago
- Security tool against dependency typosquatting attacks☆55Mar 17, 2026Updated last week
- ☆117Feb 11, 2026Updated last month
- ☆36Apr 29, 2025Updated 10 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆144Jan 28, 2024Updated 2 years ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- AWS honey token manager☆90Aug 1, 2024Updated last year
- ☆76Dec 10, 2025Updated 3 months ago
- Open Source Package Analysis☆866Feb 27, 2026Updated last month
- Scan your account for the use of untrusted AMIs☆32Mar 16, 2026Updated last week
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆189Updated this week
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago