in-toto / supply-chain-compromisesLinks
☆22Updated 3 years ago
Alternatives and similar repositories for supply-chain-compromises
Users that are interested in supply-chain-compromises are comparing it to the libraries listed below
Sorting:
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- A community collection of security reviews of open source software components.☆95Updated last year
- ☆93Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- Automated testing, generation & manipulation of #osquery packs☆73Updated 11 months ago
- Feed parsing for language package manager updates☆78Updated 10 months ago
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆200Updated this week
- App that simplifies building decision trees to model adverse scenarios☆218Updated last year
- Collect, curate, and communicate relevant security metrics for open source projects.☆63Updated last year
- Security scanning & static analysis tool☆94Updated 11 months ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 5 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆105Updated 6 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last week
- Technical Advisory Council☆131Updated this week
- egrets monitors egress☆46Updated 5 years ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- CVE.ICU code.☆46Updated this week
- Tool for collecting vulnerability data from various sources (used to build the grype database)☆102Updated this week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- K8s API Honeypot with Active Defense Capabilities☆42Updated last year
- A place to systematically store software bill of materials (SBOM) documents.☆47Updated 2 years ago
- A tool to automatically build a dependency graph and Software Bill of Materials (SBOM) for packages and arbitrary source code repositorie…☆374Updated this week
- ☆100Updated 2 weeks ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆164Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆80Updated this week
- Global Security Database Tools☆44Updated last year
- Open Source Vulnerability schema.☆208Updated last week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆152Updated last year
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago