SAP / risk-explorer-for-software-supply-chainsLinks
A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and other resources. The taxonomy as well as related safeguards can be explored using an interactive visualization tool.
☆75Updated last month
Alternatives and similar repositories for risk-explorer-for-software-supply-chains
Users that are interested in risk-explorer-for-software-supply-chains are comparing it to the libraries listed below
Sorting:
- A fork of Bandit tool with patterns to identifying malicious python code.☆27Updated 2 years ago
- Home page of project "KB"☆126Updated 2 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆145Updated last year
- Sharing software supply chain security open source projects☆50Updated 2 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆211Updated this week
- This repository contains a list of papers about software supply chain☆29Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆25Updated 5 months ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆314Updated this week
- Feed parsing for language package manager updates☆79Updated 6 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆68Updated 2 weeks ago
- A community collection of security reviews of open source software components.☆95Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆96Updated 4 months ago
- ☆45Updated 11 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- Scan pypi for typosquatting☆36Updated 2 years ago
- Code Hierarchy Exploration Net (chen)☆21Updated 2 weeks ago
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Updated 3 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆120Updated last week
- ☆22Updated 3 years ago
- Open Source Vulnerability schema.☆202Updated 3 weeks ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆51Updated 3 months ago
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆11Updated 2 weeks ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Updated last year
- ☆47Updated this week
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆191Updated 2 months ago