Samsung / CredData
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆32Updated this week
Alternatives and similar repositories for CredData:
Users that are interested in CredData are comparing it to the libraries listed below
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆116Updated this week
- Scan pypi for typosquatting☆38Updated 2 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- Towards Machine-Checked Analysis of Browser Security Mechanisms☆12Updated 8 months ago
- Mayhem example templates for programming languages and fuzzers that you love!☆28Updated last year
- A Python library and command line interface for CVE Services.☆62Updated 3 weeks ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Development of the NIST vulnerability data ontology (Vulntology).☆37Updated 8 months ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆99Updated last year
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆61Updated last week
- Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals☆28Updated 2 years ago
- CveXplore☆35Updated 2 weeks ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated this week
- OpenSSF Project Template☆17Updated last year
- CVE.ICU code.☆39Updated this week
- Exploit Prediction Scoring System (EPSS)☆24Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Updated 2 years ago
- Global Security Database Tools☆42Updated last year
- Precaution CLI - command line static application security testing tool☆23Updated this week
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 3 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆55Updated 5 months ago
- A compiler for the Meta Attack Language☆16Updated 2 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- Open YARA scan- and search engine☆19Updated 2 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- Quick and dirty script to parse bplists with Ruby☆11Updated 4 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆127Updated 2 years ago