IQTLabs / software-supply-chain-compromises
A dataset of software supply chain compromises. Please help us maintain it!
☆128Updated 2 years ago
Alternatives and similar repositories for software-supply-chain-compromises:
Users that are interested in software-supply-chain-compromises are comparing it to the libraries listed below
- Feed parsing for language package manager updates☆79Updated 5 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last week
- ☆22Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆147Updated 3 weeks ago
- OASIS TC Open Repository: A GitHub repository for management of non-normative information about the work of the CSAF Technical Committee,…☆20Updated 2 months ago
- ☆47Updated this week
- ☆63Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆201Updated this week
- Scan pypi for typosquatting☆38Updated 2 years ago
- A community collection of security reviews of open source software components.☆93Updated last year
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆138Updated 2 years ago
- CVE.ICU code.☆42Updated this week
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆28Updated 3 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆307Updated this week
- Technical Advisory Council☆122Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆92Updated 2 months ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆189Updated last month
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆64Updated last month
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆357Updated 4 months ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆56Updated 3 weeks ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- ☆19Updated last month
- App that simplifies building decision trees to model adverse scenarios☆208Updated 9 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 5 months ago
- Global Security Database Tools☆42Updated last year
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆56Updated 8 months ago