clouditor / cloud-property-graphLinks
The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.
☆28Updated 10 months ago
Alternatives and similar repositories for cloud-property-graph
Users that are interested in cloud-property-graph are comparing it to the libraries listed below
Sorting:
- Home page of project "KB"☆130Updated 7 months ago
- The heart & core of Privado code scanner☆30Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆30Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆155Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 7 months ago
- A library to extract Code Property Graphs from C/C++, Java, Go, Python, Ruby and every other language through LLVM-IR.☆384Updated this week
- A collection of test cases in the Java language. It contains examples for 112 different CWEs.☆57Updated 4 years ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆89Updated 10 months ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- Securibench Micro is a benchmark for static analysis tools for security.☆26Updated 7 years ago
- ShiftLeft OverflowDB☆130Updated 6 months ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- Code Property Graph: specification, query language, and utilities☆547Updated last month
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Updated 3 years ago
- Code Hierarchy Exploration Net (chen)☆21Updated 2 weeks ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆254Updated last week
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 3 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆74Updated this week
- Modular static malicious JavaScript detection system☆74Updated 4 years ago
- ☆51Updated last year
- Security methods for WeAkNess detection☆20Updated 8 months ago
- ACER is an AST-based Callgraph Generator Development Framework☆39Updated last year
- ☆61Updated last year
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆44Updated last year
- JoanAudit - A security slicing tool that helps security auditors to perform their security auditing tasks more efficiently☆10Updated 8 years ago
- Analyse package dependency networks at the call graph level☆95Updated last year
- MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery☆53Updated last week
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated this week
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated 2 years ago