Security scanner detecting Python Pickle files performing suspicious actions
☆395Mar 2, 2026Updated 2 weeks ago
Alternatives and similar repositories for picklescan
Users that are interested in picklescan are comparing it to the libraries listed below
Sorting:
- ☆184Feb 13, 2026Updated last month
- Protection against Model Serialization Attacks☆657Feb 18, 2026Updated last month
- Pickle Scanner GUI☆216Dec 23, 2022Updated 3 years ago
- ☆28Jan 15, 2026Updated 2 months ago
- ☆86Feb 4, 2026Updated last month
- A web CTF for training developers in bug hunting and secure coding!☆100Jan 12, 2025Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆60Nov 3, 2024Updated last year
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated 3 weeks ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A research project to add some brrrrrr to Burp☆208Feb 16, 2026Updated last month
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆235Feb 6, 2025Updated last year
- RCE PoC for Tensorflow using a malicious Lambda layer☆61Jul 30, 2025Updated 7 months ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- ☆383Jun 25, 2025Updated 8 months ago
- Multi-step automation merge tool. Extension/Script for Stable Diffusion UI by AUTOMATIC1111 https://github.com/AUTOMATIC1111/stable-diffu…☆77Sep 3, 2023Updated 2 years ago
- Security tool against dependency typosquatting attacks☆55Updated this week
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- ☆18Feb 2, 2026Updated last month
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated last month
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆86Feb 6, 2025Updated last year
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆353Mar 15, 2026Updated last week
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆311Updated this week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆269Sep 16, 2025Updated 6 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- ☆11Aug 24, 2022Updated 3 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆129Jan 28, 2026Updated last month
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Data Backend server that uses eBPF to monitor network connections and provide real-time network analytics.☆18Aug 14, 2025Updated 7 months ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Metadata-indexer and Viewer for AI-generated images☆979Feb 27, 2026Updated 3 weeks ago
- ☆14Jan 8, 2026Updated 2 months ago
- ☆24Feb 8, 2026Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month