Javascript

Explore 57 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
LavaMoat Logo

A set of tools for securing JavaScript projects against software supply chain attacks.

0
Node.js Bug Bounty Program Logo

A HackerOne-managed bug bounty program dedicated to identifying and fixing security vulnerabilities in the Node.js ecosystem.

0
Koadic Logo

A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.

0
@fastify/helmet Logo

A Fastify plugin that implements HTTP security headers through a wrapper around the helmet library to protect web applications from common vulnerabilities.

0
JS NICE Logo

Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.

0
validator.js Logo

A library of string validators and sanitizers.

0
Operating System Based Redirection with Apache mod_rewrite Logo

Detect users' operating systems and perform redirection with Apache mod_rewrite.

0
npm-zoo Logo

npm-zoo is a curated database of known malicious NPM packages that helps developers and security researchers identify and avoid potentially harmful dependencies in their projects.

0
YALIH YALIH Logo

A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.

0
UglifyJS 3 Logo

UglifyJS 3 is a JavaScript toolkit that provides parsing, minification, compression, and beautification capabilities for JavaScript code optimization and processing.

0
Nuxt Security Logo

A Nuxt 3 security module that automatically implements OWASP security patterns through HTTP headers, middleware, and various protection mechanisms including CSP, XSS validation, CORS, and CSRF protection.

0
is-website-vulnerable Logo

A command-line tool that scans websites to detect publicly known security vulnerabilities in frontend JavaScript libraries using Snyk's vulnerability database.

0
@fastify/csrf-protection Logo

A Fastify plugin that provides utilities and middleware to protect web applications against Cross-Site Request Forgery (CSRF) attacks.

0
JavaScript Beautifier Logo

Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.

0
diff-gui Logo

A web-based Android application dynamic analysis tool that provides real-time Frida instrumentation capabilities through a Flask interface with modular JavaScript hooking support.

0
DOMPurify Logo

DOMPurify is a fast XSS sanitizer for HTML, MathML, and SVG.

0
Linx Logo

A tool that reveals invisible links within JavaScript files

0
NoPP Logo

Protect against Prototype Pollution vulnerabilities in your application by freezing JavaScript objects.

0
Phish Report Logo

Phish Report is inaccessible without JavaScript and cookies enabled.

0
Confused Logo

A dependency security scanner that identifies potential supply chain vulnerabilities by checking for available package namespace registrations across Python, JavaScript, PHP, and Maven repositories.

0
PhoneyC Logo

PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.

0
peepdf Logo

A Python tool for in-depth PDF analysis and modification.

0
ThreatConnect Developer Documentation Logo

Developer documentation providing REST API and SDK resources for ThreatConnect platform integration across Python, Java, and JavaScript environments.

0
The Anatomy of a Malicious Package Logo

Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.

0