Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆48Updated this week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆141Updated this week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last month
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆72Updated last month
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- ☆151Updated 2 months ago
- ☆51Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆153Updated last year
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated last week
- OSS-Fuzz vulnerabilities for OSV.☆162Updated last week
- Trail of Bits Testing Handbook☆82Updated 2 weeks ago
- Security Harness Engineering for Robust Program Analysis☆99Updated 2 months ago
- CodeQL queries developed by Trail of Bits☆135Updated 3 weeks ago
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated last week
- ☆26Updated 2 years ago
- Code Hierarchy Exploration Net (chen)☆21Updated 2 weeks ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆86Updated last month
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆76Updated 3 years ago
- A community collection of security reviews of open source software components.☆94Updated last year
- A web browser with dynamic data-flow tracking enabled in the Javascript engine and DOM, based on Mozilla Firefox (https://github.com/mozi…☆125Updated 3 weeks ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆251Updated last week
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- A very simple open source implementation of Google's Project Naptime☆172Updated 7 months ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 months ago
- SAST + LLM Interprocedural Context Extractor☆131Updated last week
- Feed parsing for language package manager updates☆80Updated 11 months ago
- Home page of project "KB"☆130Updated 7 months ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆58Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆52Updated last year