IQTLabs / pypi-scanLinks
Scan pypi for typosquatting
☆38Updated 2 years ago
Alternatives and similar repositories for pypi-scan
Users that are interested in pypi-scan are comparing it to the libraries listed below
Sorting:
- ☆93Updated 2 years ago
- PyPI malware packages☆58Updated 6 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆148Updated last year
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆77Updated 2 weeks ago
- CVE.ICU code.☆43Updated this week
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Updated 7 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆66Updated 4 years ago
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Updated 3 weeks ago
- Debugging library to quickly get the minimal crashing test case☆37Updated 7 years ago
- Bad packages from the pypi repository☆9Updated 6 years ago
- Static code search python lib☆18Updated 4 years ago
- Generic SAST Library☆132Updated last month
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆214Updated this week
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated last year
- CveXplore☆42Updated last week
- coverage guided fuzz testing for python☆226Updated 5 years ago
- ☆15Updated 5 years ago
- NVD/CVE as JSON files☆121Updated last week
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆71Updated last month
- Static Token And Credential Scanner☆96Updated 2 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆25Updated 6 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆28Updated 2 years ago
- Default query sets for Joern☆26Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆122Updated this week