PyPI malware packages
☆59Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for pypi_malware
Users that are interested in pypi_malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan pypi for typosquatting☆38Jan 23, 2023Updated 3 years ago
- A fork of Bandit tool with patterns to identifying malicious python code.☆29Sep 1, 2022Updated 3 years ago
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆139Oct 5, 2022Updated 3 years ago
- Tool for automatic extraction of dynamic metadata from nodejs applications☆15Oct 6, 2023Updated 2 years ago
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆26Mar 31, 2023Updated 3 years ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆322Apr 1, 2026Updated last week
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- ☆11Jul 20, 2021Updated 4 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 8 months ago
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 6 years ago
- SSL certificate cloner☆14Jan 25, 2018Updated 8 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- Easy sandboxing for rust☆12Jun 19, 2016Updated 9 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 9 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Jan 8, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆20Apr 10, 2025Updated 11 months ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Resources for our ICSE'24 poster: Prompt-Enhanced Software Vulnerability Detection Using ChatGPT.☆25May 8, 2024Updated last year
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆117Mar 21, 2026Updated 2 weeks ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- A security-oriented static binary analysis tool for comparing the quantity and quality of code reuse gadget sets in program variants.☆18Oct 13, 2023Updated 2 years ago
- 这个脚本主要提供对pypi供应链的源头进行安全扫描研究,扫描并发现未知的恶意包情况。☆28May 22, 2023Updated 2 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- LowEndInsight is a simple "bus-factor" risk analysis library for Open Source Software that is managed within a Git repository. Provide th…☆13Jan 17, 2023Updated 3 years ago
- Call-graph generator.☆23Jun 13, 2018Updated 7 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- KLEE Symbolic Execution Engine☆61Oct 27, 2019Updated 6 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago