setu1421 / SecretBench
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
☆27Updated 7 months ago
Alternatives and similar repositories for SecretBench:
Users that are interested in SecretBench are comparing it to the libraries listed below
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆73Updated last month
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆46Updated last week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆59Updated 6 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆64Updated this week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆89Updated 11 months ago
- Manager of third-party sources of Semgrep rules 🗂☆77Updated 5 months ago
- A collection of prompt injection mitigation techniques.☆20Updated last year
- Externalize Java application access to protected resources as log messages.☆41Updated 8 months ago
- Evaluation Framework for Dependency Analysis (EFDA)☆43Updated 2 years ago
- using ML models for red teaming☆39Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆49Updated this week
- AI featured threat modeling and security review project☆14Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated 11 months ago
- A Security Scanner for Go☆26Updated 5 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- ☆36Updated 3 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆141Updated 10 months ago
- XBOW Validation Benchmarks☆59Updated 4 months ago
- ATLAS tactics, techniques, and case studies data☆54Updated 3 months ago
- InfoSec OpenAI Examples☆19Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆172Updated this week
- A security-first linter for code that shouldn't need linting☆16Updated last year
- ☆10Updated 2 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆24Updated last year
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆104Updated 3 weeks ago
- ☆32Updated 2 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆87Updated last year
- Bundle of security analysis scripts for keras tensorflow models☆12Updated 9 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆127Updated 2 years ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆60Updated this week