IQTLabs / software-supply-chain-compromisesLinks
A dataset of software supply chain compromises. Please help us maintain it!
☆130Updated 3 years ago
Alternatives and similar repositories for software-supply-chain-compromises
Users that are interested in software-supply-chain-compromises are comparing it to the libraries listed below
Sorting:
- A community collection of security reviews of open source software components.☆96Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆157Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated 3 weeks ago
- CVE.ICU code.☆49Updated this week
- Feed parsing for language package manager updates☆80Updated last year
- ☆22Updated 4 years ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- ☆48Updated this week
- Scan pypi for typosquatting☆38Updated 2 years ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆204Updated 2 months ago
- ☆69Updated 5 months ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Updated 2 years ago
- ☆93Updated 3 years ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆378Updated last week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆286Updated this week
- ☆19Updated 5 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆178Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 10 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆49Updated 2 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated last month
- Global Security Database Tools☆43Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆85Updated 2 weeks ago
- Software Component Verification Standard (SCVS)☆152Updated 8 months ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆75Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 9 years ago
- A tool to check the security settings of Github Organizations.☆75Updated 2 years ago
- OASIS TC Open Repository: CSAF Parser tool for parsing and checking the syntax of the Common Vulnerability Reporting Framework (CVRF) con…☆23Updated 3 years ago