IQTLabs / pypi-scan
Scan pypi for typosquatting
☆38Updated 2 years ago
Alternatives and similar repositories for pypi-scan:
Users that are interested in pypi-scan are comparing it to the libraries listed below
- A dataset of software supply chain compromises. Please help us maintain it!☆127Updated 2 years ago
- PyPI malware packages☆58Updated 6 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆24Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆74Updated last week
- Bad packages from the pypi repository☆9Updated 6 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆142Updated last year
- ☆93Updated 2 years ago
- CVE.ICU code.☆38Updated this week
- CveXplore☆36Updated last week
- A place to systematically store software bill of materials (SBOM) documents.☆44Updated last year
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆63Updated this week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆187Updated this week
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆26Updated last year
- Static code search python lib☆18Updated 4 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Updated 2 years ago
- Feed parsing for language package manager updates☆77Updated 3 months ago
- ☆22Updated 3 years ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆17Updated last year
- ☆44Updated 8 months ago
- Modular static malicious JavaScript detection system☆69Updated 4 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Updated 7 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆65Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- This repository contains a list of papers about software supply chain☆27Updated 10 months ago
- A command line tool for detecting vulnerabilities in Python dependencies and doing safe package installs☆51Updated 2 years ago
- ☆13Updated 5 months ago