PyPI malware packages
☆59Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for pypi_malware
Users that are interested in pypi_malware are comparing it to the libraries listed below
Sorting:
- Scan pypi for typosquatting☆38Jan 23, 2023Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆81Feb 28, 2026Updated 2 weeks ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆136Oct 5, 2022Updated 3 years ago
- Tool for automatic extraction of dynamic metadata from nodejs applications☆15Oct 6, 2023Updated 2 years ago
- ☆26Mar 31, 2023Updated 2 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆311Updated this week
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- ☆11Jul 20, 2021Updated 4 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Aug 10, 2021Updated 4 years ago
- PyDFix is a tool that helps detect and fix dependency errors that cause the unreproducibility of Python builds. PyDFix takes as input the…☆12Feb 7, 2023Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆21Mar 7, 2025Updated last year
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated last month
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 5 years ago
- Fluentd plugin to route records based on Kubernetes labels and namespace☆13Apr 11, 2025Updated 11 months ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- ZAP add-on containing the web-backdoors and attack files from FuzzDB☆20Mar 1, 2026Updated 2 weeks ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- webkit based web browser☆10Nov 18, 2015Updated 10 years ago
- A simple tool for serving and monitoring nvidia-smi in the browser☆14Mar 25, 2021Updated 4 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆116Jan 24, 2026Updated last month
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Inline, interactive graphs inside jupyter/ipython notebooks☆16Aug 19, 2017Updated 8 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Playstation 3 VSH Menu and Overlay. Works on CFW & PS3HEN☆12Jan 7, 2024Updated 2 years ago
- [Android] Samsung Knox Standard activation helper library for Android☆11Jun 14, 2019Updated 6 years ago
- LowEndInsight is a simple "bus-factor" risk analysis library for Open Source Software that is managed within a Git repository. Provide th…☆13Jan 17, 2023Updated 3 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- Continuous Integration and Development ExploiteR☆87Dec 7, 2022Updated 3 years ago
- Bash, cross-compiled and modified for android.☆14Apr 25, 2012Updated 13 years ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago