setu1421 / SecretBenchLinks
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
☆42Updated last year
Alternatives and similar repositories for SecretBench
Users that are interested in SecretBench are comparing it to the libraries listed below
Sorting:
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆129Updated last month
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last month
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated this week
- Manager of third-party sources of Semgrep rules 🗂☆87Updated last year
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆72Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆227Updated this week
- Bundle of security analysis scripts for keras tensorflow models☆14Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆137Updated last year
- Monthly CVE Stats☆43Updated 2 weeks ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 7 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆95Updated 7 months ago
- Data about all known supply-chain attacks through history☆60Updated 3 months ago
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆40Updated 9 months ago
- A project to visualize the software supply chain☆53Updated 2 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacks☆59Updated 3 years ago
- ☆30Updated last month
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆179Updated this week
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆59Updated 5 months ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming work☆134Updated 3 months ago
- Data Scientists Go To Jupyter☆66Updated 6 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 2 months ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆27Updated 7 months ago
- ☆113Updated 2 years ago
- using ML models for red teaming☆44Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆79Updated last month
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆98Updated this week
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 6 months ago