setu1421 / SecretBenchLinks
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
β48Updated last year
Alternatives and similar repositories for SecretBench
Users that are interested in SecretBench are comparing it to the libraries listed below
Sorting:
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules πβ98Updated last month
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and versβ¦β135Updated this week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and oβ¦β79Updated 2 weeks ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.β84Updated last week
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β42Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.β301Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebasβ¦β160Updated last year
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β139Updated 2 years ago
- Data about all known supply-chain attacks through historyβ63Updated 8 months ago
- A project to visualize the software supply chainβ58Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.β23Updated 4 years ago
- Secure Jupyter Notebooks and Experimentation Environmentβ84Updated last year
- β114Updated 2 years ago
- β34Updated 6 months ago
- A comprehensive list of software composition analysis tools.β162Updated 3 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ106Updated last year
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β141Updated 3 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endoβ¦β202Updated this week
- A community collection of security reviews of open source software components.β96Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.β21Updated 10 months ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chainβ97Updated 11 months ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agentsβ67Updated 9 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source reposβ63Updated last week
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3β116Updated 6 months ago
- using ML models for red teamingβ45Updated 2 years ago
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacksβ61Updated 3 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.β22Updated 2 years ago
- Top 10 for Agentic AI (AI Agent Security) serves as the core for OWASP and CSA Red teaming workβ167Updated 4 months ago
- LLM Testing Findings Templatesβ75Updated last year
- Monthly CVE Statsβ44Updated this week