Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"
☆47Jan 25, 2022Updated 4 years ago
Alternatives and similar repositories for amalfi-artifact
Users that are interested in amalfi-artifact are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jul 25, 2024Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆139Oct 5, 2022Updated 3 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 2 months ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆117Mar 21, 2026Updated 2 weeks ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆22Mar 7, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Jun 26, 2023Updated 2 years ago
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆486Updated this week
- ☆30Nov 29, 2021Updated 4 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,045Updated this week
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Jul 24, 2023Updated 2 years ago
- Open Source Package Analysis☆872Feb 27, 2026Updated last month
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆25Dec 10, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- Construct approximate static call graph for JavaScript & Typescript☆198Dec 8, 2022Updated 3 years ago
- ☆24Jun 10, 2023Updated 2 years ago
- JavaScript/TypeScript static analyzer for call graph construction, library usage pattern matching, and vulnerability exposure analysis☆425Feb 20, 2026Updated last month
- A dataset of software supply chain compromises. Please help us maintain it!☆131Sep 16, 2022Updated 3 years ago
- a project repository for a paper☆20May 4, 2024Updated last year
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Nov 4, 2023Updated 2 years ago
- Reproduction package of the paper "DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning" in Automated S…☆20Feb 25, 2023Updated 3 years ago
- A manually vetted dataset for security vulnerability detection in Java projects☆93Aug 12, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ☆38Oct 4, 2024Updated last year
- ☆10Sep 25, 2024Updated last year
- UpCy automatically finds compatible updates for Maven dependencies.☆12Feb 8, 2026Updated 2 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- ☆32May 1, 2025Updated 11 months ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- YASA-UAST is an intermediate representation structure for multi-language program analysis. The UAST-Parser parses code from different pro…☆75Apr 3, 2026Updated last week
- Static Python call graph generator☆366Nov 26, 2023Updated 2 years ago
- blog with go☆11Jul 5, 2023Updated 2 years ago
- ODGen is a JavaScript Static Analysis tool to detect multiple types of vulnerabilities in Node.js packages.☆167Jan 29, 2024Updated 2 years ago
- ☆11Nov 2, 2022Updated 3 years ago
- ☆15May 6, 2022Updated 3 years ago
- Orlis/Orcis☆21Dec 27, 2018Updated 7 years ago