setu1421 / SecretBench
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
☆30Updated 9 months ago
Alternatives and similar repositories for SecretBench:
Users that are interested in SecretBench are comparing it to the libraries listed below
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆74Updated this week
- ATLAS tactics, techniques, and case studies data☆58Updated 2 weeks ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆112Updated 3 weeks ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆91Updated last month
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆51Updated last week
- Bundle of security analysis scripts for keras tensorflow models☆13Updated 11 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- using ML models for red teaming☆43Updated last year
- ShiftLeft Scan is a free and open-source commercial-grade security tool for modern DevOps teams.☆13Updated 2 years ago
- ☆44Updated 8 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆23Updated 2 months ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆63Updated 3 weeks ago
- Leak patterns for LeakTK tools to use☆8Updated last week
- InfoSec OpenAI Examples☆19Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆72Updated last month
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- Data Scientists Go To Jupyter☆62Updated 3 weeks ago
- Externalize Java application access to protected resources as log messages.☆41Updated 10 months ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆17Updated last year
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆59Updated 2 weeks ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆49Updated last week
- Scan pypi for typosquatting☆38Updated 2 years ago
- Static Token And Credential Scanner☆96Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago