Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆43Updated last week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆133Updated this week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last month
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆71Updated last month
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 2 years ago
- OSS-Fuzz vulnerabilities for OSV.☆162Updated this week
- Code Hierarchy Exploration Net (chen)☆21Updated this week
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- ☆146Updated 3 months ago
- ☆26Updated 2 years ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Updated 2 years ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆59Updated last week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- ☆48Updated last year
- Trail of Bits Testing Handbook☆79Updated last month
- Feed parsing for language package manager updates☆78Updated 9 months ago
- Mayhem example templates for programming languages and fuzzers that you love!☆33Updated 2 weeks ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆220Updated this week
- A very simple open source implementation of Google's Project Naptime☆167Updated 5 months ago
- Security Harness Engineering for Robust Program Analysis☆67Updated 2 weeks ago
- ☆28Updated 2 months ago
- CVE.ICU code.☆46Updated this week
- Low-effort reachability analysis for third-party code vulnerabilities.☆21Updated 2 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆76Updated 3 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆41Updated last week
- Scan pypi for typosquatting☆38Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆77Updated last week
- A set of vulnerable C code snippets (with mapped CVEs)☆79Updated last year
- ATLAS tactics, techniques, and case studies data☆77Updated 3 weeks ago
- A community collection of security reviews of open source software components.☆95Updated last year
- ☆15Updated 5 years ago