Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Python binding for the libusb C library.
| Python |package_bold| module is a low-level binding for libusb C library.
| It is an effort to allow python programs full access to the API implemented
and provided by the well known *libusb* <https://libusb.info/>
__ library.
PyPI record
_.
Documentation
_.
| |package_bold| is a lightweight Python package, based on the ctypes library. | It is fully compliant implementation of the original C libusb 1.0 API by implementing whole its functionality in a clean Python instead of C. | | libusb API 1.0 documentation can be found at:
libusb-1.0 API Reference <http://api.libusb.info>
__
|package_bold| uses the underlying libusb C shared library as specified in libusb.cfg (included libusb-X.X.* is the default), but there is also ability to specify it programmatically by one of the following ways:
.. code:: python
import libusb libusb.config(LIBUSB="libusb C shared library absolute path")
libusb.config(LIBUSB=None) # included libusb-X.X.* will be used
Borrowed from the original website <https://libusb.info/>
__:
libusb - A cross-platform user library to access USB devices
Overview
libusb is a C library that provides generic access to USB devices. It is intended to be used by developers to facilitate the production of applications that communicate with USB hardware.
It is portable: Using a single cross-platform API, it provides access to USB devices on Linux, OS X, Windows, Android, OpenBSD, etc.
It is user-mode: No special privilege or elevation is required for the application to communicate with a device.
It is version-agnostic: All versions of the USB protocol, from 1.0 to 3.1 (latest), are supported.
What platforms are supported?
Linux, OS X, Windows, Windows CE, Android, OpenBSD/NetBSD, Haiku.
For additional information, please consult the
FAQ <https://github.com/libusb/libusb/wiki/FAQ>
__
or the Wiki <https://github.com/libusb/libusb/wiki>
__.
Prerequisites:
Python 3.9 or higher
pip and setuptools
To install run:
.. parsed-literal::
python -m pip install --upgrade |package|
Prerequisites:
Development is strictly based on tox. To install it run::
python -m pip install --upgrade tox
Visit Development page
_.
Installation from sources:
clone the sources:
.. parsed-literal::
git clone |respository| |package|
and run:
.. parsed-literal::
python -m pip install ./|package|
or on development mode:
.. parsed-literal::
python -m pip install --editable ./|package|
| |copyright| | Licensed under the zlib/libpng License | https://opensource.org/license/zlib | Please refer to the accompanying LICENSE file.
.. |package| replace:: libusb .. |package_bold| replace:: libusb .. |copyright| replace:: Copyright (c) 2016-2024 Adam Karpierz .. |respository| replace:: https://github.com/karpierz/libusb.git .. _Development page: https://github.com/karpierz/libusb .. _PyPI record: https://pypi.org/project/libusb/ .. _Documentation: https://libusb.readthedocs.io/ .. _USB Vendors: https://devicehunt.com/all-usb-vendors
FAQs
Python binding for the libusb C library.
We found that libusb demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.