llnl / SurfactantLinks
Modular framework for file information extraction and dependency analysis to generate accurate SBOMs
☆39Updated this week
Alternatives and similar repositories for Surfactant
Users that are interested in Surfactant are comparing it to the libraries listed below
Sorting:
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆89Updated 3 weeks ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆83Updated 3 weeks ago
- A place to systematically store software bill of materials (SBOM) documents.☆50Updated 2 years ago
- Fork Threat Modeling Platform - Community☆27Updated 3 months ago
- Data about all known supply-chain attacks through history☆63Updated 8 months ago
- Posture Attribute Collection and Evaluation☆23Updated 2 years ago
- Sharing software supply chain security open source projects☆53Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 11 months ago
- A community collection of security reviews of open source software components.☆96Updated last year
- EPSS(Exploit Prediction Scoring System) API client☆19Updated 3 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and vers…☆135Updated last week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 7 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated last week
- SBOM Move - Automate build and transfer of SBOMs across systems☆25Updated last week
- Examples and proof-of-concept for Software Bill of Materials (SBOM) code & data☆66Updated last year
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆14Updated this week
- Pentester-focused Docker registry tool to enumerate and pull images☆36Updated 3 months ago
- ☆86Updated 3 weeks ago
- Trail of Bits Testing Handbook - appsec.guide☆91Updated last week
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights …☆94Updated this week
- ☆10Updated 3 years ago
- Precaution CLI - command line static application security testing tool☆26Updated this week
- Publications from the eBPF foundation☆28Updated last month
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆97Updated 11 months ago
- SBOM Search - Context aware search in SBOM repositories☆29Updated 2 months ago
- Manage collection of SBOMs (Software Bill of Materials)☆14Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆141Updated 11 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆127Updated last month