Common Information
Type | Value |
---|---|
Value |
setup.py |
Category | |
Type | Domain |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-11-08 | 12 | Python obfuscation traps | ||
Details | Website | 2023-10-23 | 1 | GATOR - GCP Attack Toolkit For Offensive Research, A Tool Designed To Aid In Research And Exploiting Google Cloud Environments - RedPacket Security | ||
Details | Website | 2023-09-26 | 27 | Sensitive Data Exfiltration Campaign Targets npm and PyPI | ||
Details | Website | 2023-09-05 | 19 | PYTA31 Continues to Plague the Open-Source Ecosystem with Sophisticated Info-Stealing Malware | ||
Details | Website | 2023-09-04 | 12 | Nascent Malware Campaign Targets npm, PyPI, and RubyGems Developers | ||
Details | Website | 2023-08-14 | 16 | FortiGuard AI Detects Continued OSS Supply Chain Attacks Hidden in the Python Package Index | FortiGuard Labs | ||
Details | Website | 2023-08-09 | 8 | Malicious package detection in PyPI | ||
Details | Website | 2023-08-07 | 34 | DFIR-IRIS Modules walk-through Part 1: A Skeleton Dance | ||
Details | Website | 2023-07-28 | 21 | Solving “ATTACKTIVE DIRECTORY”: A Step-by-Step Walkthrough of a Vulnerable Machine on TryHackMe | ||
Details | Website | 2023-07-11 | 10 | Six Malicious Python Packages in the PyPI Targeting Windows Users | ||
Details | Website | 2023-06-27 | 6 | Cyberonix: A quite useful tool for cybersecurity professionals and people of the cybersecurity… | ||
Details | Website | 2023-06-19 | 366 | Inside of the WASP's nest: deep dive into PyPI-hosted malware | ||
Details | Website | 2023-06-19 | 366 | Inside of the WASP's nest: deep dive into PyPI-hosted malware | Antivirus and Security news | ||
Details | Website | 2023-06-16 | 9 | PyPI Suspends New Registrations After Malicious Python Script Attack - Check Point Blog | ||
Details | Website | 2023-06-12 | 5 | Python Threat Hunting Tools: Part 6 — Creating EXEs from Python Files | ||
Details | Website | 2023-05-21 | 10 | Dumpulator - An Easy-To-Use Library For Emulating Memory Dumps. Useful For Malware Analysis (Config Extraction, Unpacking) And Dynamic Analysis In General (Sandboxing) - RedPacket Security | ||
Details | Website | 2023-05-18 | 13 | (Un)secure development, part 2: borrowing metadata from popular packages to fake Python project ratings | ||
Details | Website | 2023-05-12 | 5 | Phylum Detects Suspicious Publications Surrounding Popular Python Package Flask | ||
Details | Website | 2023-05-11 | 12 | Indicator-Intelligence - Finds Related Domains And IPv4 Addresses To Do Threat Intelligence After Indicator-Intelligence Collects Static Files - RedPacket Security | ||
Details | Website | 2023-05-04 | 7 | Malicious NPM, PyPI Packages Stealing User Information | ||
Details | Website | 2023-04-30 | 16 | Bad Beat Poetry | ||
Details | Website | 2023-04-28 | 476 | PENTESTING TOOLS AND PROCEDURE | ||
Details | Website | 2023-04-25 | 4 | PyPI Packages Found Distributing Payloads in WhiteSnake Malware Campaign | ||
Details | Website | 2023-04-24 | 33 | New .NET Malware “WhiteSnake” Targets Python Developers, Uses Tor for C&C Communication | JFrog | ||
Details | Website | 2023-04-15 | 4 | ‘Blatantly Obvious’: Spyware Offered to Cyberattackers via PyPI Python Repository |