setu1421 / SecretBenchLinks
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
β42Updated last year
Alternatives and similar repositories for SecretBench
Users that are interested in SecretBench are comparing it to the libraries listed below
Sorting:
- Manager of third-party sources of Semgrep rules πβ88Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and oβ¦β78Updated 2 weeks ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.β71Updated last week
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and versβ¦β129Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebasβ¦β153Updated last year
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β41Updated 9 months ago
- future-proof vulnerability detection benchmark, based on CVEs in open-source reposβ59Updated last week
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chainβ95Updated 8 months ago
- using ML models for red teamingβ44Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.β239Updated last week
- β113Updated 2 years ago
- Secure Jupyter Notebooks and Experimentation Environmentβ84Updated 8 months ago
- Data about all known supply-chain attacks through historyβ60Updated 4 months ago
- A collection of prompt injection mitigation techniques.β24Updated 2 years ago
- Monthly CVE Statsβ43Updated last week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,β¦β137Updated last year
- A collection of Semgrep rules which followed security guidelines for .NET and Java.β23Updated 4 years ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endoβ¦β179Updated this week
- Data Scientists Go To Jupyterβ66Updated 7 months ago
- A comprehensive list of software composition analysis tools.β156Updated last year
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP seβ¦β99Updated 3 weeks ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ105Updated 8 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ34Updated 7 months ago
- Bundle of security analysis scripts for keras tensorflow modelsβ14Updated last year
- Focused malicious code detection ruleset, with a high protection-to-noise ratioβ127Updated 7 months ago
- LLM Testing Findings Templatesβ73Updated last year
- β31Updated 2 months ago
- β68Updated 2 months ago
- Performing secure code review with LLMs (and vibe coding IDEs)β27Updated 2 months ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β137Updated 6 months ago