Demonstrates how a malicious dependency could negatively impact the build output.
☆25Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for malicious-dependencies
Users that are interested in malicious-dependencies are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ILANDS Sensor traffic data analysis software packages☆10Apr 9, 2026Updated last month
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 3 years ago
- OpenControl Database☆11Jan 5, 2023Updated 3 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- ☆12Jan 14, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NVD API 2.0 for python☆14Sep 26, 2024Updated last year
- Source Code Transparency☆11Sep 25, 2023Updated 2 years ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 6 months ago
- Repository for the Huntsville/Madison DevOps for Defense Meetup. Join us at meetup.com.☆11Aug 10, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Specification for uri templates.☆16Dec 25, 2016Updated 9 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CodeQL Guide☆11Jan 12, 2022Updated 4 years ago
- ☆65May 21, 2024Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- ☆14Apr 23, 2019Updated 7 years ago
- Sharing software supply chain security open source projects☆54Dec 19, 2022Updated 3 years ago
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- ☆14Jan 8, 2026Updated 4 months ago
- ☆19Feb 3, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OSCAL reusable component definitions library☆16Mar 14, 2025Updated last year
- ☆18Jul 30, 2024Updated last year
- A container to deal with Yubico smartcard devices without having to mess with your kernel.☆10May 5, 2016Updated 10 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- This's a Python package for the Saxon/C 1.2.1, an XML processor from Saxonica. Currently, it packs the open-source version or the home ed…☆16Dec 22, 2024Updated last year
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Javascript Code Injection for Debugging☆21Nov 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- FedRAMP Automation☆16Nov 10, 2023Updated 2 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- A Claude Code plugin that automatically captures everything Claude does during your coding sessions, compresses it with AI (using Claude'…☆44Dec 7, 2025Updated 5 months ago