A dataset of software supply chain compromises. Please help us maintain it!
☆131Sep 16, 2022Updated 3 years ago
Alternatives and similar repositories for software-supply-chain-compromises
Users that are interested in software-supply-chain-compromises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆136Oct 5, 2022Updated 3 years ago
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Jun 13, 2022Updated 3 years ago
- Collection of tools for analyzing open source packages.☆358Mar 9, 2026Updated 2 weeks ago
- ☆11Aug 24, 2023Updated 2 years ago
- 💡 Info about the nice-registry project☆12Aug 23, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A reading list for software supply-chain security.☆365Nov 21, 2022Updated 3 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Go implementation for CNAB content trust verification using TUF, Notary, and in-toto☆31Jul 5, 2023Updated 2 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆14Sep 28, 2023Updated 2 years ago
- ☆100Dec 21, 2020Updated 5 years ago
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Dec 19, 2020Updated 5 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆316Updated this week
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆116Updated this week
- A library for parsing security advisories☆13Feb 5, 2026Updated last month
- Awesome materials for software supply chain security☆18May 13, 2020Updated 5 years ago
- Specification and other related documents.☆50Jan 13, 2025Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- Packaging Metadata Comparions☆18Apr 3, 2020Updated 5 years ago
- SSE to Stdio MCP Proxy Server☆20Mar 9, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆183Dec 21, 2022Updated 3 years ago
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆39Mar 10, 2024Updated 2 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ☆93Aug 30, 2022Updated 3 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Apr 1, 2016Updated 9 years ago
- boostsecurityio/lotp☆147Mar 3, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆30Nov 29, 2021Updated 4 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 2 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆215Feb 4, 2026Updated last month
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- ☆61Jun 20, 2022Updated 3 years ago