A Python package that demontrates arbitrary code execution during the install process of a Python package.
☆11Sep 28, 2014Updated 11 years ago
Alternatives and similar repositories for malicious-python-package
Users that are interested in malicious-python-package are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fork of Bandit tool with patterns to identifying malicious python code.☆29Sep 1, 2022Updated 3 years ago
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Jan 8, 2022Updated 4 years ago
- ☆15Jul 27, 2023Updated 2 years ago
- Python wrapper for libraries.io API☆19Dec 1, 2024Updated last year
- Quiz Game in Phaser☆10Apr 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- 利用lex和yacc完成编译原理与技术课本中的三个实验:词法分析,语法分析,语义分析☆18Jul 3, 2019Updated 6 years ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆25May 8, 2024Updated last year
- SDK en Go para la integración con el Sistema Integrado de Administración Tributaria (SIAT) v2.☆29Updated this week
- Demo of a malicious python package that will run code upon pip download or install☆29Sep 10, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- ☆15Jan 24, 2023Updated 3 years ago
- ☆11May 14, 2024Updated last year
- Recursos asociados a la formación de elasticsearch [Febrero 2019]☆14May 17, 2019Updated 6 years ago
- The official Android App of the faculty 07 of the University of Applied Sciences Munich☆13Dec 9, 2016Updated 9 years ago
- A small group for NCU students who want to learn Hacking.☆12Dec 17, 2017Updated 8 years ago
- Example implementations of PEP 578 and 551 entry points☆35May 12, 2025Updated 10 months ago
- Turns a website into a Virtual Camera output☆25Sep 23, 2023Updated 2 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Remove Green Colour from Image and put new background image using Machine Learning OpenCV library☆17Jul 25, 2018Updated 7 years ago
- ☆26Mar 31, 2023Updated 2 years ago
- Example of a Scalable Nuxt Project with the boilerplate https://github.com/CKGrafico/Frontend-Boilerplates/tree/nuxt-dev☆12May 23, 2018Updated 7 years ago
- For our ICSE22 paper "EAGLE: Creating Equivalent Graphs to Test Deep Learning Libraries" by Jiannan Wang, Thibaud Lutellier, Shangshu Qia…☆13Aug 16, 2023Updated 2 years ago
- ☆12Jun 27, 2025Updated 9 months ago
- ☆14Oct 30, 2024Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆136Oct 5, 2022Updated 3 years ago
- Fork of Gerrit Pape's runit init/services management and execution framework.☆50Feb 11, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Krab tamagotchi☆28Jan 23, 2026Updated 2 months ago
- A Dataset of 600k Java Source Code Changes Categorized by Diff Size http://arxiv.org/pdf/2108.04631☆23Mar 22, 2024Updated 2 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Vul4J: A Dataset of Reproducible Java Vulnerabilities☆124Sep 2, 2025Updated 6 months ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 7 years ago