setu1421 / SecretBench
SecretBench is a dataset consisting of different secret types collected from public open-source repositories.
☆25Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for SecretBench
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆44Updated this week
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆71Updated 3 weeks ago
- AI featured threat modeling and security review project☆12Updated last week
- XBOW Validation Benchmarks☆53Updated 2 months ago
- Manager of third-party sources of Semgrep rules 🗂☆76Updated 4 months ago
- ☆20Updated 2 months ago
- A collection of prompt injection mitigation techniques.☆18Updated last year
- Externalize Java application access to protected resources as log messages.☆41Updated 6 months ago
- The Cloud Property Graph is based on a Code Property Graph and tries to connect static code analysis and Cloud runtime assessment.☆22Updated 2 weeks ago
- Bundle of security analysis scripts for keras tensorflow models☆10Updated 7 months ago
- ☆30Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆55Updated 4 months ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- A security-first linter for code that shouldn't need linting☆16Updated last year
- My custom semgrep rules☆18Updated 4 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆52Updated this week
- Payloads for Attacking Large Language Models☆64Updated 4 months ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆141Updated 8 months ago
- LLM Testing Findings Templates☆65Updated 9 months ago
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- Data Scientists Go To Jupyter☆57Updated last week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆22Updated 4 months ago
- ☆41Updated 4 months ago
- A zero-dependency tool for finding secrets in directories☆10Updated 3 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆127Updated 9 months ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆20Updated last year
- AI featured threat modeling and security review action☆40Updated last week