clouditor / cloud-property-graph
The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.
☆23Updated 2 months ago
Alternatives and similar repositories for cloud-property-graph:
Users that are interested in cloud-property-graph are comparing it to the libraries listed below
- The heart & core of Privado code scanner☆28Updated 4 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆74Updated this week
- Home page of project "KB"☆120Updated 2 weeks ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆87Updated 2 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 2 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆24Updated 2 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆26Updated last year
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- A library to extract Code Property Graphs from C/C++, Java, Go, Python, Ruby and every other language through LLVM-IR.☆307Updated this week
- ☆54Updated last year
- Analyse package dependency networks at the call graph level☆93Updated last year
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆73Updated 5 months ago
- Program analysis tools built on tree-sitter (https://github.com/tree-sitter/tree-sitter).☆38Updated last year
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆53Updated 3 years ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆63Updated 2 weeks ago
- This repository contains a list of papers about software supply chain☆27Updated 10 months ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 4 years ago
- An integration of JoernTI's CodeTIDAL5 neural type inference model.☆21Updated 2 months ago
- ☆26Updated last year
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆30Updated 9 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- Security methods for WeAkNess detection☆20Updated last month
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Updated 3 years ago
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Updated 7 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆88Updated last year
- Code Hierarchy Exploration Net (chen)☆19Updated 2 weeks ago
- ☆34Updated 2 years ago
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆62Updated last year
- A C/C++ dependency scanner☆38Updated last year
- Vision Transformer-Inspired Automated Vulnerability Repair☆15Updated 2 weeks ago