Samsung / CredDataLinks
CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆35Updated last week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆124Updated this week
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- CveXplore☆40Updated 2 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- Mayhem example templates for programming languages and fuzzers that you love!☆33Updated last year
- A Python library and command line interface for CVE Services.☆65Updated 2 weeks ago
- A dataset of software supply chain compromises. Please help us maintain it!☆128Updated 2 years ago
- Scan pypi for typosquatting☆36Updated 2 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- ☆22Updated 3 years ago
- Feed parsing for language package manager updates☆80Updated 6 months ago
- OpenSSF Project Template☆18Updated last year
- The Privacy Adversarial Framework (PAF) is a knowledge base of privacy-focused adversarial tactics and techniques. PAF is heavily inspire…☆57Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- ☆28Updated 4 months ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆57Updated last week
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆39Updated last week
- Exploit Prediction Scoring System (EPSS)☆26Updated 3 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- A community collection of security reviews of open source software components.☆94Updated last year
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆68Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals☆28Updated 2 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆120Updated this week
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago