An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.
☆333Apr 15, 2026Updated this week
Alternatives and similar repositories for malicious-software-packages-dataset
Users that are interested in malicious-software-packages-dataset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆118Mar 21, 2026Updated 3 weeks ago
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,058Updated this week
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆139Oct 5, 2022Updated 3 years ago
- ☆17Jul 25, 2024Updated last year
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆22Mar 7, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A fork of Bandit tool with patterns to identifying malicious python code.☆29Sep 1, 2022Updated 3 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 2 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆261Apr 9, 2026Updated last week
- Open Source Package Analysis☆874Feb 27, 2026Updated last month
- Automatically scan new pypi packages for potentially malicious code☆31Mar 24, 2024Updated 2 years ago
- PyPI malware packages☆59Dec 12, 2018Updated 7 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆82Apr 3, 2026Updated last week
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆146Jan 28, 2024Updated 2 years ago
- ☆18Jul 30, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago
- A Python pickling decompiler and static analyzer☆618Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- OWASP Kubernetes Security Testing Guide☆42Dec 22, 2025Updated 3 months ago
- Macaron is an extensible supply-chain security analysis framework from Oracle Labs that supports a wide range of build systems and CI/CD …☆190Updated this week
- A dataset of software supply chain compromises. Please help us maintain it!☆131Sep 16, 2022Updated 3 years ago
- MDG-based static vulnerability scanner specialized in analyzing npm packages and detecting taint-style and prototype pollution vulnerabil…☆25Dec 10, 2025Updated 4 months ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Feed parsing for language package manager updates☆84Dec 4, 2024Updated last year
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- NOVA: The Prompt Pattern Matching☆128Jan 27, 2026Updated 2 months ago
- ☆10Dec 4, 2020Updated 5 years ago
- ☆13Jun 26, 2023Updated 2 years ago
- Demos for our research on Github actions script injection vulnerabilities☆13May 14, 2024Updated last year
- Dataset with labeled benign and malicious files 🗃️☆155Jul 19, 2023Updated 2 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 3 years ago
- Packj stops Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in y…☆686Updated this week
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Aug 28, 2024Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆34Jan 4, 2025Updated last year
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆104Feb 11, 2026Updated 2 months ago