google / vanirLinks
Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system. By default, Vanir pulls up-to-date CVEs from Open Source Vulnerabilities (OSV) together with their corresponding signatures so that users can transparently scan missing patches for an up-to-date list of CVEs.
☆340Updated last month
Alternatives and similar repositories for vanir
Users that are interested in vanir are comparing it to the libraries listed below
Sorting:
- OSV-SCALIBR: A library for Software Composition Analysis☆502Updated this week
- Prevent merging of malicious code in pull requests☆235Updated 6 months ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆403Updated last month
- Code Pathfinder, the open-source alternative to GitHub CodeQL built with GoLang. Built for advanced structural search, derive insights, f…☆67Updated this week
- io_uring based rootkit☆235Updated 5 months ago
- Deep Linux runtime visibility meets Wireshark☆294Updated 2 months ago
- Securing open-source package ecosystems by originating, validating, and augmenting build attestations.☆648Updated this week
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆345Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆232Updated this week
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆72Updated this week
- A very simple open source implementation of Google's Project Naptime☆169Updated 5 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- ☆84Updated 2 months ago
- Trail of Bits Testing Handbook☆79Updated last month
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆128Updated 7 months ago
- ☆314Updated 2 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆120Updated 3 weeks ago
- #supply #chain #attack #detection☆554Updated this week
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆331Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 7 months ago
- CI/CD Security Analyzer☆672Updated 7 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆364Updated 2 years ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆822Updated last week
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated 2 years ago
- A repo to conduct vulnerability enrichment.☆682Updated this week
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆40Updated 9 months ago
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆501Updated 9 months ago
- eBPF Memory Dump Tool☆86Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 10 months ago
- ☆86Updated 8 months ago