IQTLabs / pypi-scanLinks
Scan pypi for typosquatting
☆36Updated 2 years ago
Alternatives and similar repositories for pypi-scan
Users that are interested in pypi-scan are comparing it to the libraries listed below
Sorting:
- A fork of Bandit tool with patterns to identifying malicious python code.☆27Updated 2 years ago
- Bad packages from the pypi repository☆9Updated 6 years ago
- PyPI malware packages☆58Updated 6 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- ☆22Updated 3 years ago
- ☆93Updated 2 years ago
- ☆15Updated 5 years ago
- Do You Know What's In Your Python Packages? A Tool for Visualizing Python Package Registry Security Audit Data☆19Updated 3 years ago
- Static code search python lib☆18Updated 4 years ago
- CveXplore☆40Updated 2 weeks ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated this week
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆145Updated last year
- A curated threat modeling library collection☆22Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆211Updated this week
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- CVE.ICU code.☆42Updated this week
- OASIS TC Open Repository: Match STIX content against STIX patterns☆44Updated 2 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset (ASE 2024 Demo)☆51Updated 3 months ago
- Modular static malicious JavaScript detection system☆70Updated 4 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- CyCAT.org taxonomies☆15Updated 4 years ago
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Updated 2 years ago
- ☆59Updated 4 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆66Updated 4 years ago
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆37Updated this week
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆134Updated 2 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆32Updated 2 years ago
- A place to systematically store software bill of materials (SBOM) documents.☆46Updated 2 years ago