Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆50Updated 2 weeks ago
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆143Updated last week
- ☆152Updated 2 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆76Updated last week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last week
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- ☆52Updated last year
- Trail of Bits Testing Handbook☆85Updated last week
- A very simple open source implementation of Google's Project Naptime☆173Updated 8 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆61Updated last week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆155Updated last year
- OSS-Fuzz vulnerabilities for OSV.☆166Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆255Updated last week
- ATLAS tactics, techniques, and case studies data☆88Updated this week
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆96Updated last month
- A community collection of security reviews of open source software components.☆96Updated last year
- CodeQL queries developed by Trail of Bits☆136Updated last month
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆78Updated 4 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated last month
- ☆27Updated 2 years ago
- Security Harness Engineering for Robust Program Analysis☆104Updated 3 months ago
- Feed parsing for language package manager updates☆80Updated 11 months ago
- Data Scientists Go To Jupyter☆67Updated 8 months ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Updated 2 weeks ago
- ☆75Updated 3 weeks ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆36Updated this week
- OWASP Ontology-driven Threat Modelling framework☆41Updated 2 years ago
- Post Processor for Facebook Static Analysis Tools.☆141Updated last week
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 9 months ago
- Code Hierarchy Exploration Net (chen)☆24Updated 3 weeks ago