Demonstrates what a malicious PyPI package could do to you :O
Project description
Purposefully Malicious
This is only for educational purposes. I will not be responsible if anyone modifies this code base to do harm.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for purposefully-malicious-1.0.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | eed7cfa02e730124091eb36bfaca1cdaf7bfae5a71a50507fc2fab3c76ad1a44 |
|
MD5 | 9ea349f5b91714ebd35185fac43b663a |
|
BLAKE2b-256 | 6552bac1ac588e47c18457319f2ee270f1c5f608fc94d2e8e6746fc384e96d9f |
Close
Hashes for purposefully_malicious-1.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | f8413fcf878fbb428b196c108e3589b50253dae247e58f2e79e116a52b28c8fd |
|
MD5 | 895bdac2f4c463c2c226a07fa590edfb |
|
BLAKE2b-256 | e3561ed06ebfa3f4f07ed42c3c81c8205c6cf208b2884e98d5455657c97d1e1c |