phylum-dev / vuln-reachLinks
A library for building tools to determine if vulnerabilities are reachable in a code base.
☆16Updated 2 months ago
Alternatives and similar repositories for vuln-reach
Users that are interested in vuln-reach are comparing it to the libraries listed below
Sorting:
- Automated vulnerability discovery and annotation☆67Updated last year
- SARIF Explorer: A VSCode extension that helps you visualize and triage static analysis results☆37Updated 3 weeks ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆121Updated last month
- Clonewise - Detecting Package Clones and Inferring Security Vulnerabilities on Entire Linux Distributions.☆25Updated 12 years ago
- Labeled vulnerability-package match pairs used as ground truth to evaluate vulnerability scanners☆12Updated this week
- Data about all known supply-chain attacks through history☆60Updated 4 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆44Updated last week
- ☆13Updated 8 months ago
- 💅🏽 analyzes your github actions☆95Updated last month
- Trail of Bits Testing Handbook☆82Updated 2 weeks ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 8 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆74Updated 2 years ago
- CveXplore☆42Updated last month
- ☆93Updated 3 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated 2 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆47Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated 3 weeks ago
- A tool to automatically detect copy+pasted and vendored code between repositories☆69Updated last month
- Crowdsourced fuzzing cluster. 🚀☆21Updated 4 years ago
- Feed parsing for language package manager updates☆79Updated 10 months ago
- ☆14Updated 4 months ago
- excrypto offers specialized versions of the Go crypto, TLS, x509, and SSH packages designed for security research.☆14Updated last week
- A community collection of security reviews of open source software components.☆95Updated last year
- ☆29Updated 2 weeks ago
- A security-first linter for code that shouldn't need linting☆16Updated 2 years ago
- egrets monitors egress☆46Updated 5 years ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆71Updated last week