IQTLabs / pypi-scanLinks
Scan pypi for typosquatting
☆38Updated 2 years ago
Alternatives and similar repositories for pypi-scan
Users that are interested in pypi-scan are comparing it to the libraries listed below
Sorting:
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 2 years ago
- PyPI malware packages☆58Updated 6 years ago
- ☆93Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆78Updated last month
- A tool which tries to map CVEs from NVD to packages in supported ecosystems (Maven, NPM, PyPI).☆12Updated last month
- The OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebas…☆151Updated last year
- CveXplore☆43Updated last week
- CVE.ICU code.☆46Updated this week
- Extract useful semantic from CVE descriptions usinig NLP☆25Updated 2 years ago
- NVD/CVE as JSON files☆122Updated this week
- Static code search python lib☆18Updated 4 years ago
- Syntactic detection of malicious (obfuscated) JavaScript files☆83Updated 5 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆76Updated last week
- Identifying Open-Source License Violation and 1-day Security Risk at Large Scale☆67Updated 7 years ago
- CVSS2/3/4 library with interactive calculator for Python 2 and Python 3☆107Updated 3 weeks ago
- A simple python library to assist in working with cpes☆19Updated last year
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated last month
- Static Token And Credential Scanner☆96Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.1, purl, and vers…☆128Updated 2 weeks ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated last year
- ☆16Updated 7 years ago
- ☆30Updated 4 years ago
- Low-effort reachability analysis for third-party code vulnerabilities.☆21Updated 2 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆25Updated 6 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- Vulnerability Information Aggregator for CVEs☆123Updated 6 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆29Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆216Updated this week
- ☆22Updated 3 years ago