Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆53Updated last week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆147Updated last week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated 2 weeks ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆84Updated this week
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated 3 months ago
- OSS-Fuzz vulnerabilities for OSV.☆170Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆160Updated last year
- ☆27Updated 2 years ago
- A community collection of security reviews of open source software components.☆96Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- ☆156Updated 5 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆63Updated last week
- Trail of Bits Testing Handbook - appsec.guide☆92Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆135Updated 2 weeks ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆79Updated 4 years ago
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- Code Hierarchy Exploration Net (chen)☆24Updated last week
- A very simple open source implementation of Google's Project Naptime☆184Updated 10 months ago
- ☆52Updated last year
- A web browser with dynamic data-flow tracking enabled in the Javascript engine and DOM, based on Mozilla Firefox (https://github.com/mozi…☆155Updated 2 weeks ago
- ☆32Updated 3 weeks ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆41Updated 4 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆89Updated this week
- Post Processor for Facebook Static Analysis Tools.☆141Updated this week
- Scan pypi for typosquatting☆38Updated 3 years ago
- A Python library and command line interface for CVE Services.☆71Updated last week
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆48Updated last year
- Feed parsing for language package manager updates☆81Updated last year
- CodeQL queries developed by Trail of Bits☆144Updated 3 weeks ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated last year
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆62Updated 8 months ago