IQTLabs / software-supply-chain-compromises
A dataset of software supply chain compromises. Please help us maintain it!
☆127Updated 2 years ago
Alternatives and similar repositories for software-supply-chain-compromises:
Users that are interested in software-supply-chain-compromises are comparing it to the libraries listed below
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆141Updated 11 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- Feed parsing for language package manager updates☆76Updated 2 months ago
- Stakeholder-Specific Vulnerability Categorization☆136Updated this week
- A community collection of security reviews of open source software components.☆93Updated 11 months ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆183Updated this week
- ☆63Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆178Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆289Updated this week
- A tool to check the security settings of Github Organizations.☆71Updated last year
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆178Updated last year
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆61Updated last week
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆351Updated 2 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- App that simplifies building decision trees to model adverse scenarios☆201Updated 7 months ago
- ☆73Updated 3 months ago
- ☆22Updated 3 years ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- ☆93Updated 2 years ago
- Software Component Verification Standard (SCVS)☆140Updated 10 months ago
- Segment's Threat Modeling training for our engineers☆241Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Open Source Vulnerability schema.☆191Updated last week
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆71Updated 9 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆20Updated this week
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Security scanning & static analysis tool☆94Updated 4 months ago