Demonstrates how a malicious dependency could negatively impact the build output.
☆25Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for malicious-dependencies
Users that are interested in malicious-dependencies are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java archive implant toolkit.☆61Apr 20, 2025Updated 11 months ago
- Collating an overview of the open source software supply chain landscape -- and synthesizing that survey in a hopefully-useful way.☆33Apr 4, 2023Updated 3 years ago
- A cli that can be used to query various online vulnerability sources such as the NVD or GHSA. The CLI and docker images can be used to mi…☆165Apr 6, 2026Updated last week
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- My personal monorepo, containing my dotfiles and related infrastructure☆13Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- NVD API 2.0 for python☆13Sep 26, 2024Updated last year
- Source Code Transparency☆11Sep 25, 2023Updated 2 years ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- Repository for the Huntsville/Madison DevOps for Defense Meetup. Join us at meetup.com.☆11Aug 10, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 2 months ago
- Specification for uri templates.☆16Dec 25, 2016Updated 9 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆143Jan 28, 2026Updated 2 months ago
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14Apr 23, 2019Updated 6 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- Sharing software supply chain security open source projects☆54Dec 19, 2022Updated 3 years ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- ☆14Jan 8, 2026Updated 3 months ago
- ☆18Feb 3, 2026Updated 2 months ago
- ☆22Jul 12, 2024Updated last year
- OSCAL reusable component definitions library☆16Mar 14, 2025Updated last year
- ☆18Jul 30, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A container to deal with Yubico smartcard devices without having to mess with your kernel.☆10May 5, 2016Updated 9 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Nuclei plugins to audit Chrome extensions☆66Jul 16, 2024Updated last year
- FedRAMP Automation☆16Nov 10, 2023Updated 2 years ago
- A curated collection of tools and resources for building security with a developer first approach.☆30Jul 29, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- A Claude Code plugin that automatically captures everything Claude does during your coding sessions, compresses it with AI (using Claude'…☆44Dec 7, 2025Updated 4 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- WAyereless Site SUrveying Program☆12Feb 9, 2016Updated 10 years ago
- Code repository for Practical XMPP, published by Packt☆10Jan 30, 2023Updated 3 years ago
- ☆116Feb 11, 2026Updated 2 months ago