hannob / pypi-badLinks
Bad packages from the pypi repository
☆9Updated 6 years ago
Alternatives and similar repositories for pypi-bad
Users that are interested in pypi-bad are comparing it to the libraries listed below
Sorting:
- Scan pypi for typosquatting☆36Updated 2 years ago
- PyPI malware packages☆58Updated 6 years ago
- Debugging library to quickly get the minimal crashing test case☆37Updated 7 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆75Updated last month
- Polyglot detector☆21Updated last year
- ☆13Updated 2 weeks ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆26Updated 2 years ago
- Avalanche is a document generator which uses context-free grammars to generate randomized outputs for fuzz-testing.☆32Updated 4 years ago
- CPython bytecode instrumentation and forkserver tools for fuzzing pure python and mixed python/c code using AFL☆31Updated 4 years ago
- CveXplore☆40Updated 2 months ago
- Regular expression Search on the command-line☆16Updated 2 months ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- Python interface for Binexport, the Bindiff export format☆16Updated 3 weeks ago
- ☆15Updated 5 years ago
- Attempts at fuzzing Python unpicklers☆38Updated last year
- ☆44Updated 10 months ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆24Updated 12 years ago
- Detect patterns of bad behavior in function calls☆26Updated 4 years ago
- ☆22Updated 3 years ago
- Mayhem example templates for programming languages and fuzzers that you love!☆33Updated last year
- A coverage-based software testing tool☆34Updated 4 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- ☆47Updated 5 years ago
- Default query sets for Joern☆27Updated 3 years ago
- A library for building tools to determine if vulnerabilities are reachable in a code base.☆14Updated 9 months ago
- The Binary Mutation code based on Uroboros☆14Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- A set of templates for different academic venues.☆28Updated 5 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago