Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆52Updated last week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆146Updated this week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆81Updated last week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last week
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- ☆52Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆290Updated this week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆64Updated last week
- Low-effort reachability analysis for third-party code vulnerabilities.☆22Updated 2 years ago
- ☆154Updated 4 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆78Updated 4 years ago
- Feed parsing for language package manager updates☆80Updated last year
- Trail of Bits Testing Handbook - appsec.guide☆88Updated this week
- Data about all known supply-chain attacks through history☆63Updated 7 months ago
- Code Hierarchy Exploration Net (chen)☆24Updated this week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆134Updated 3 weeks ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆159Updated last year
- OWASP Ontology-driven Threat Modelling framework☆39Updated 2 years ago
- OSS-Fuzz vulnerabilities for OSV.☆168Updated this week
- A very simple open source implementation of Google's Project Naptime☆179Updated 9 months ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Updated 3 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- A tool for quantitative risk analysis of Android applications based on machine learning techniques☆159Updated 2 weeks ago
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated 2 months ago
- ☆30Updated 3 months ago
- A web browser with dynamic data-flow tracking enabled in the Javascript engine and DOM, based on Mozilla Firefox (https://github.com/mozi…☆153Updated this week
- CodeQL queries developed by Trail of Bits☆138Updated last week
- Modular static malicious JavaScript detection system☆75Updated 4 years ago
- A community collection of security reviews of open source software components.☆96Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 8 months ago