SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
☆48Jun 13, 2024Updated last year
Alternatives and similar repositories for SecretBench
Users that are interested in SecretBench are comparing it to the libraries listed below
Sorting:
- Rust bindings to the Vectorscan high-performance regex library☆19Feb 20, 2026Updated last week
- CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot☆11Jul 11, 2023Updated 2 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- A report formatter for Bandit (a Python security analyzer) that produces output in the SARIF format.☆20Sep 19, 2023Updated 2 years ago
- ML models often mispredict, and it is hard to tell when and why. We present a data mining based approach to discover whether there is a c…☆17Jun 6, 2022Updated 3 years ago
- CodeQL Security Queries☆27Updated this week
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- CVE-2022-22965 - CVE-2010-1622 redux☆19Apr 18, 2023Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- A web application that contains several unit tests for the purpose of .NET security☆33Oct 5, 2017Updated 8 years ago
- Rethinking the User Interface of AI☆32Updated this week
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 7 months ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- Repo for CIS hardening based on CIS standards☆44Mar 13, 2019Updated 6 years ago
- ☆13Nov 5, 2024Updated last year
- Thoth Tech Employee Handbook☆11Nov 14, 2022Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆47Jan 4, 2026Updated last month
- PE file mapping and manipulation package.☆36May 6, 2022Updated 3 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Bitsquat Domain Generation Script☆58Dec 8, 2019Updated 6 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- ☆10May 12, 2022Updated 3 years ago
- A Sensor Streamer for Android Wear OS☆14Feb 9, 2024Updated 2 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- ☆11Jul 20, 2021Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆43Oct 8, 2019Updated 6 years ago
- GitHub Action to generate a csv file listing the dependencies detected in a repository☆11Apr 4, 2024Updated last year
- ☆17Feb 3, 2026Updated 3 weeks ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- ☆19Jan 15, 2026Updated last month