setu1421 / SecretBenchLinks
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
☆32Updated 11 months ago
Alternatives and similar repositories for SecretBench
Users that are interested in SecretBench are comparing it to the libraries listed below
Sorting:
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- ATLAS tactics, techniques, and case studies data☆73Updated last month
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆56Updated last week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆144Updated last year
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆25Updated 4 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆65Updated this week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆120Updated this week
- A collection of prompt injection mitigation techniques.☆23Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654☆39Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆128Updated 2 years ago
- Bundle of security analysis scripts for keras tensorflow models☆14Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 11 months ago
- CVE.ICU code.☆42Updated this week
- Secure Jupyter Notebooks and Experimentation Environment☆75Updated 4 months ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆48Updated 2 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆94Updated 3 months ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆40Updated last month
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 3 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆96Updated last year
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- using ML models for red teaming☆43Updated last year
- Code Hierarchy Exploration Net (chen)☆21Updated this week
- ☆33Updated 3 years ago
- A community collection of security reviews of open source software components.☆94Updated last year
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆58Updated 3 years ago
- Manager of third-party sources of Semgrep rules 🗂☆86Updated 10 months ago
- CodeQL Security Queries☆27Updated last week