clouditor / cloud-property-graphLinks
The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.
☆27Updated 7 months ago
Alternatives and similar repositories for cloud-property-graph
Users that are interested in cloud-property-graph are comparing it to the libraries listed below
Sorting:
- The heart & core of Privado code scanner☆30Updated 9 months ago
- Home page of project "KB"☆128Updated 4 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆41Updated 4 months ago
- Code Hierarchy Exploration Net (chen)☆21Updated 3 weeks ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆89Updated 7 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆76Updated 3 years ago
- A library to extract Code Property Graphs from C/C++, Java, Go, Python, Ruby and every other language through LLVM-IR.☆366Updated this week
- Securibench Micro is a benchmark for static analysis tools for security.☆26Updated 7 years ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- CogniCrypt_SAST: CrySL-to-Static Analysis Compiler☆77Updated last week
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 2 years ago
- ACER is an AST-based Callgraph Generator Development Framework☆37Updated last year
- A fork of Bandit tool with patterns to identifying malicious python code.☆29Updated 2 years ago
- This repository contains a list of papers about software supply chain☆30Updated last year
- Security methods for WeAkNess detection☆20Updated 5 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆216Updated this week
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆58Updated 5 months ago
- Code Property Graph: specification, query language, and utilities☆532Updated 3 weeks ago
- ☆48Updated last year
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆57Updated 4 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆71Updated 3 weeks ago
- ShiftLeft OverflowDB☆130Updated 3 months ago
- ODGen is a JavaScript Static Analysis tool to detect multiple types of vulnerabilities in Node.js packages.☆155Updated last year
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Updated 7 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- An inter-procedural data-flow analysis framework using value-based context sensitivity☆91Updated last year
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Updated 2 years ago