A dataset of software supply chain compromises. Please help us maintain it!
☆131Sep 16, 2022Updated 3 years ago
Alternatives and similar repositories for software-supply-chain-compromises
Users that are interested in software-supply-chain-compromises are comparing it to the libraries listed below
Sorting:
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- ☆22Nov 27, 2021Updated 4 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆136Oct 5, 2022Updated 3 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 3 weeks ago
- ☆11Nov 11, 2022Updated 3 years ago
- ☆11Aug 24, 2023Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Go implementation for CNAB content trust verification using TUF, Notary, and in-toto☆31Jul 5, 2023Updated 2 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under …☆25Dec 19, 2020Updated 5 years ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆213Feb 4, 2026Updated last month
- ☆36Apr 29, 2025Updated 10 months ago
- ☆100Dec 21, 2020Updated 5 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- SAML Shield is an open-source Node.js library that proactively validates and rejects malicious SAML assertions at the protocol level, pro…☆54Feb 6, 2026Updated last month
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Dec 12, 2025Updated 2 months ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- App that simplifies building decision trees to model adverse scenarios☆228Jul 11, 2024Updated last year
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆48Jun 13, 2023Updated 2 years ago
- Terraform provider to perform OCI image operations☆15Updated this week
- ☆12Feb 24, 2023Updated 3 years ago
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Jan 26, 2026Updated last month
- demo of keyless signing with the sigstore kubernetes policy controller☆11Sep 7, 2022Updated 3 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated last month
- ☆29May 12, 2025Updated 9 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- egrets monitors egress☆47Apr 12, 2020Updated 5 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆29Sep 1, 2022Updated 3 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Specification and other related documents.☆50Jan 13, 2025Updated last year
- agent for handling seccomp descriptors for container runtimes☆47Feb 1, 2024Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- Witness Examples☆12Feb 27, 2024Updated 2 years ago