lyvd / bandit4malLinks
A fork of Bandit tool with patterns to identifying malicious python code.
☆28Updated 2 years ago
Alternatives and similar repositories for bandit4mal
Users that are interested in bandit4mal are comparing it to the libraries listed below
Sorting:
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆77Updated 2 weeks ago
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Updated 3 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆214Updated this week
- This repository contains a list of papers about software supply chain☆29Updated last year
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆45Updated 3 years ago
- Home page of project "KB"☆127Updated 4 months ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆148Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆97Updated 3 months ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆12Updated 2 years ago
- A C/C++ dependency scanner☆39Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆41Updated 3 months ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- ☆26Updated 2 years ago
- MPHunter can detect malicious packages without explicit knowledge.☆5Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆134Updated 2 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆322Updated this week
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆20Updated 4 months ago
- Collection of tools for analyzing open source packages.☆350Updated last week
- CVEfixes: Automated Collection of Vulnerabilities and Their Fixes from Open-Source Software☆264Updated last year
- ☆33Updated 10 months ago
- ☆57Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆26Updated 6 months ago
- PyPI malware packages☆58Updated 6 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆21Updated 2 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆70Updated last week
- Feed parsing for language package manager updates☆79Updated 8 months ago
- An ever-growing list of resources for data-driven vulnerability assessment and prioritization☆127Updated 2 years ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆75Updated 3 years ago