Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆52Updated last week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆81Updated last week
- ☆154Updated 4 months ago
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆146Updated this week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆64Updated last week
- ☆52Updated last year
- ☆27Updated 2 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- Trail of Bits Testing Handbook - appsec.guide☆89Updated this week
- OSS-Fuzz vulnerabilities for OSV.☆168Updated last week
- Mayhem example templates for programming languages and fuzzers that you love!☆36Updated 2 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆159Updated last year
- A community collection of security reviews of open source software components.☆96Updated last year
- Code Hierarchy Exploration Net (chen)☆24Updated this week
- Multi-agent system (MAS) hijacking demos☆39Updated this week
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆46Updated last year
- ☆30Updated 3 months ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆101Updated 3 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆78Updated 4 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆88Updated this week
- CodeQL queries developed by Trail of Bits☆138Updated last week
- Security Harness Engineering for Robust Program Analysis☆108Updated 4 months ago
- Feed parsing for language package manager updates☆80Updated last year
- Post Processor for Facebook Static Analysis Tools.☆140Updated 2 weeks ago
- Modular framework for file information extraction and dependency analysis to generate accurate SBOMs☆37Updated last week
- A very simple open source implementation of Google's Project Naptime☆181Updated 9 months ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Updated 2 months ago
- ☆15Updated 5 years ago