lyvd / bandit4mal
A fork of Bandit tool with patterns to identifying malicious python code.
☆25Updated 2 years ago
Alternatives and similar repositories for bandit4mal:
Users that are interested in bandit4mal are comparing it to the libraries listed below
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last week
- This repository contains a list of papers about software supply chain☆29Updated 11 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆43Updated 3 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆133Updated 2 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆11Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆203Updated this week
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆88Updated this week
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- Home page of project "KB"☆124Updated last month
- ☆55Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆128Updated 2 years ago
- OSS-Fuzz vulnerabilities for OSV.☆154Updated this week
- Feed parsing for language package manager updates☆79Updated 5 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆18Updated 2 months ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆308Updated this week
- A C/C++ dependency scanner☆38Updated last year
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆74Updated 3 years ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆25Updated 3 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 3 weeks ago
- ☆31Updated 7 months ago
- PyPI malware packages☆58Updated 6 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆65Updated this week
- ☆26Updated last year
- ☆16Updated 9 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year