PyPI malware packages
☆60Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for pypi_malware
Users that are interested in pypi_malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan pypi for typosquatting☆37Jan 23, 2023Updated 3 years ago
- A zoo for malicious NPM packages☆20Dec 8, 2022Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆81May 12, 2026Updated last week
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆140Oct 5, 2022Updated 3 years ago
- This repository contains a list of papers about software supply chain☆29May 22, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Aug 10, 2021Updated 4 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles☆20Mar 24, 2021Updated 5 years ago
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 9 months ago
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Mar 30, 2020Updated 6 years ago
- SSL certificate cloner☆14Jan 25, 2018Updated 8 years ago
- Easy sandboxing for rust☆12Jun 19, 2016Updated 9 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 9 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆16Oct 25, 2021Updated 4 years ago
- webkit based web browser☆10Nov 18, 2015Updated 10 years ago
- A text classifier in Python using classification algorithms of machine learning (Support vector machines, Naïve Bayes classifier) to dete…☆10Dec 11, 2017Updated 8 years ago
- A reimplementation of LastPyMile: A Python-based library to Identify the differences between build artifacts of PyPI packages and the res…☆15Jan 8, 2022Updated 4 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- ☆20Apr 10, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- Inline, interactive graphs inside jupyter/ipython notebooks☆16Aug 19, 2017Updated 8 years ago
- Passkey Complete for Python - Integrate into your Python API or service to enable a completely passwordless standalone auth solution with…☆12Jan 9, 2026Updated 4 months ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 7 years ago
- Playstation 3 VSH Menu and Overlay. Works on CFW & PS3HEN☆12Jan 7, 2024Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- [Android] Samsung Knox Standard activation helper library for Android☆11Jun 14, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- ☆13Apr 9, 2022Updated 4 years ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- KLEE Symbolic Execution Engine☆61Oct 27, 2019Updated 6 years ago
- Bash, cross-compiled and modified for android.☆14Apr 25, 2012Updated 14 years ago
- ☆14Jun 7, 2018Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago