setu1421 / SecretBench
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
β29Updated 8 months ago
Alternatives and similar repositories for SecretBench:
Users that are interested in SecretBench are comparing it to the libraries listed below
- Manager of third-party sources of Semgrep rules πβ78Updated 7 months ago
- XBOW Validation Benchmarksβ71Updated 5 months ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.β22Updated 3 weeks ago
- A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654β38Updated 10 months ago
- A collection of prompt injection mitigation techniques.β20Updated last year
- using ML models for red teamingβ42Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different soβ¦β49Updated last week
- future-proof vulnerability detection benchmark, based on CVEs in open-source reposβ46Updated last week
- CodeQL Security Queriesβ24Updated last week
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β38Updated 2 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.β178Updated this week
- ATLAS tactics, techniques, and case studies dataβ56Updated 4 months ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and oβ¦β75Updated last month
- Externalize Java application access to protected resources as log messages.β40Updated 9 months ago
- Secure Jupyter Notebooks and Experimentation Environmentβ65Updated 2 weeks ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.β22Updated 2 months ago
- β43Updated 7 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebasβ¦β141Updated 11 months ago
- Automated vulnerability discovery and annotationβ64Updated 6 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.β11Updated 2 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilitiesβ30Updated 8 months ago
- Low-effort reachability analysis for third-party code vulnerabilities.β20Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and versβ¦β105Updated this week
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)β56Updated 10 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).β27Updated this week
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)β23Updated 7 months ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.β62Updated 3 weeks ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chainβ90Updated last week
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!β127Updated 2 years ago