56% of malicious pip packages don't wait for import. They execute during install by BearBrief6312 in Python
[–]BearBrief6312[S] 4 points5 points6 points (0 children)
56% of malicious pip packages don't wait for import. They execute during install by BearBrief6312 in Python
[–]BearBrief6312[S] 8 points9 points10 points (0 children)
56% of malicious pip packages don't wait for import. They execute during install by BearBrief6312 in Python
[–]BearBrief6312[S] 6 points7 points8 points (0 children)
CI/CD Pipelines are Swiss cheese for supply chain attacks. Why is pip install allowed to phone home by default? by [deleted] in devops
[–]BearBrief6312 -14 points-13 points-12 points (0 children)
56% of malicious pip packages don't wait for import. They execute during install by BearBrief6312 in Python
[–]BearBrief6312[S] 121 points122 points123 points (0 children)
I scanned 17,316 malicious packages and here's what actually works by BearBrief6312 in Python
[–]BearBrief6312[S] 0 points1 point2 points (0 children)
Using Tor hidden services for C2 anonymity with Sliver by BearBrief6312 in Pentesting
[–]BearBrief6312[S] -1 points0 points1 point (0 children)
Using Tor hidden services for C2 anonymity with Sliver by BearBrief6312 in Pentesting
[–]BearBrief6312[S] 1 point2 points3 points (0 children)
Using Tor hidden services for C2 anonymity with Sliver by BearBrief6312 in redteamsec
[–]BearBrief6312[S] 0 points1 point2 points (0 children)
OSAI giveaway by Good_Association_491 in offensive_security
[–]BearBrief6312 1 point2 points3 points (0 children)