Demonstrates what a malicious PyPI package could do to you :O
Project description
Purposefully Malicious
This is only for educational purposes. I will not be responsible if anyone modifies this code base to do harm.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for purposefully-malicious-0.0.1.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | dda36c9143ba29e2aa2db8b5e2981309be8efb18c62f17cfb14af1a55a73d3b3 |
|
MD5 | da00a710e0a8bed6783824abb3496a21 |
|
BLAKE2b-256 | 812fd7e540d5e74e2246695439dff7411242dc5043e7f26dadc51c4915be2e7b |
Close
Hashes for purposefully_malicious-0.0.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 398dec906b460d559d597fc8e4c97a9a9a102be2cd0cc6ab9fdcb1632102dd1a |
|
MD5 | 4752bfe581b9c27f547fbf54cd881d1c |
|
BLAKE2b-256 | 3099eebac568d6e8602aa900f5143b6e63b1661ddfaded98f4f85e45de948169 |