lyvd / bandit4malLinks
A fork of Bandit tool with patterns to identifying malicious python code.
☆28Updated 3 years ago
Alternatives and similar repositories for bandit4mal
Users that are interested in bandit4mal are comparing it to the libraries listed below
Sorting:
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated 2 weeks ago
- Home page of project "KB"☆129Updated 6 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆239Updated this week
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆46Updated 3 years ago
- This repository contains a list of papers about software supply chain☆29Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆12Updated 2 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆41Updated 5 months ago
- A C/C++ dependency scanner☆40Updated last year
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆280Updated last year
- ☆60Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆135Updated 3 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆102Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆152Updated last year
- ☆26Updated 2 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆20Updated 7 months ago
- MoreFixes: A Large-Scale Dataset of CVE Fix Commits Mined through Enhanced Repository Discovery☆42Updated 5 months ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆96Updated 2 years ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆21Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆354Updated this week
- ☆34Updated last year
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆76Updated 3 years ago
- Collection of tools for analyzing open source packages.☆349Updated last month
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆129Updated 2 years ago
- PyPI malware packages☆58Updated 6 years ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆27Updated 8 months ago