PyPI Malicious Packages
Click to view the database: https://intelliradar.netlify.app/
Click to view the database: https://intelliradar.netlify.app/
There is the detail explain for this table:
"Package Name": "The specific name of the malicious package identified in the registry.",
"Manage": "Name of the package manager.",
"Package Version": "Version number of the malicious package (if available).",
"Date of Discovery": "Date when the malicious package was first identified or reported.",
"Repository Link": "URL of the repository where the malicious package is located (if available).",
"Method of Attack": "Strategies, malicious behaviors, or techniques used by the malicious package to compromise systems or data.",
"Discoverer": "The individual or organization responsible for discovering the malicious package.",
"Impacted Systems": "List of systems, software, or platforms known to be affected by the malicious package.",
"Attack Vector": "The means or method used by the malicious package to access systems or networks.",
"IOC": "Observable data points, such as reported URLs, IPs, and other evidence indicating security vulnerabilities associated with the malicious package.",
"Content Path": "Text of the blog from the intelligence source",
"Intelligence Source": "Source of the intelligence",
"News Date": "Publication date of the blog",
"Package Released Time": "Release time of the malicious package."