A dataset of software supply chain compromises. Please help us maintain it!
☆131Sep 16, 2022Updated 3 years ago
Alternatives and similar repositories for software-supply-chain-compromises
Users that are interested in software-supply-chain-compromises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Jan 8, 2022Updated 4 years ago
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Jun 13, 2022Updated 3 years ago
- ☆22Nov 27, 2021Updated 4 years ago
- Collection of tools for analyzing open source packages.☆360May 1, 2026Updated last week
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A reading list for software supply-chain security.☆365Nov 21, 2022Updated 3 years ago
- Go implementation for CNAB content trust verification using TUF, Notary, and in-toto☆31Jul 5, 2023Updated 2 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆14Sep 28, 2023Updated 2 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆341Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆120Mar 21, 2026Updated last month
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- sget is a keyless safe script retrieval and execution tool☆18Feb 7, 2022Updated 4 years ago
- A library for parsing security advisories☆13Apr 13, 2026Updated 3 weeks ago
- Awesome materials for software supply chain security☆17May 13, 2020Updated 5 years ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- Specification and other related documents.☆50Jan 13, 2025Updated last year
- Packaging Metadata Comparions☆18Apr 3, 2020Updated 6 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- egrets monitors egress☆46Apr 12, 2020Updated 6 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆184Dec 21, 2022Updated 3 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- SSE to Stdio MCP Proxy Server☆23Mar 9, 2026Updated last month
- fatt tries to find any purl in your project by looking at predefined fields in the supported packages. These fields describe using a purl…☆11Apr 14, 2026Updated 3 weeks ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Various public documents, whitepapers and articles about APT campaigns☆55Apr 1, 2016Updated 10 years ago
- Supply Chain Security Research - Living Off The Pipeline tools☆150Apr 14, 2026Updated 3 weeks ago
- ☆43Aug 27, 2025Updated 8 months ago
- ☆30Nov 29, 2021Updated 4 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆218Feb 4, 2026Updated 3 months ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago