jeremylong / malicious-dependenciesView external linksLinks
Demonstrates how a malicious dependency could negatively impact the build output.
☆25Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for malicious-dependencies
Users that are interested in malicious-dependencies are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆14Jan 8, 2026Updated last month
- Java archive implant toolkit.☆61Apr 20, 2025Updated 9 months ago
- ☆18Jul 30, 2024Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆92Jan 28, 2026Updated 2 weeks ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- ☆65May 21, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- ☆29Jul 24, 2025Updated 6 months ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 8 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- ☆25Jun 27, 2024Updated last year
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- ☆49Mar 21, 2023Updated 2 years ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- ☆20May 14, 2025Updated 9 months ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- ☆29Dec 26, 2025Updated last month
- ☆20Mar 7, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Sep 14, 2023Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 5 months ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 2 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated 2 weeks ago
- Crypto Chart Widget for GitHub.☆10Dec 27, 2024Updated last year
- ☆24Aug 9, 2022Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago