Npm

Explore 26 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
iScan Advanced Scanning Tool Logo

Scans repositories for exposed secrets, API keys, and credentials for bug bounty

0
Seekrets OSS Logo

A secret scanning tool that examines NPM modules and ZIP files for exposed credentials and sensitive information using nuclei templates.

0
express-enforces-ssl Logo

A Node.js middleware module that automatically enforces HTTPS connections by redirecting HTTP requests to HTTPS URLs in Express.js applications.

0
AuditJS Logo

AuditJS is a command-line tool that scans JavaScript projects for known vulnerabilities and outdated packages in npm dependencies using the OSS Index API or Nexus IQ Server.

0
npm-scan Logo

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

0
Audit Node Modules With YARA Rules Logo

A tool to run YARA rules against node_module folders to identify suspicious scripts

0
NodeSecure Logo

NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.

0
OWASP Juice Shop CTF Extension Logo

A Node.js CLI tool that automates the setup of CTF events using OWASP Juice Shop challenges across multiple CTF frameworks.

0
Fix Lockfile Integrity Logo

Reverts sha1 integrity back to sha512 in lock files for enhanced security.

0
Dependency Combobulator Logo

An open-source framework that detects and prevents dependency confusion attacks across multiple package management systems and development environments.

0
pkgsign Logo

A CLI tool for signing and verifying npm and yarn packages.

0
github-search Logo

A collection of CLI tools and API utilities for searching and filtering GitHub repositories by various criteria including keywords, users, organizations, and repository attributes.

0
npq Logo

A tool that safely installs packages with npm/yarn by auditing them as part of your install process.

0
Hijagger Logo

A tool that checks for hijackable packages in NPM and Python Pypi registries

0
GuardDog Logo

GuardDog is a CLI tool that identifies malicious PyPI and npm packages using heuristics-based analysis of source code and metadata.

0
Phylum Logo

Identifies 137 malicious npm packages and gathers system information to a remote server.

0
npm-zoo Logo

npm-zoo is a curated database of known malicious NPM packages that helps developers and security researchers identify and avoid potentially harmful dependencies in their projects.

0
UglifyJS 3 Logo

UglifyJS 3 is a JavaScript toolkit that provides parsing, minification, compression, and beautification capabilities for JavaScript code optimization and processing.

0
Appland Downloader Logo

A command-line tool for downloading Android APK files from the Appland platform via npm installation.

0
@fastify/csrf-protection Logo

A Fastify plugin that provides utilities and middleware to protect web applications against Cross-Site Request Forgery (CSRF) attacks.

0
Noia Logo

Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.

0
Confused Logo

A dependency security scanner that identifies potential supply chain vulnerabilities by checking for available package namespace registrations across Python, JavaScript, PHP, and Maven repositories.

0
June's Sophisticated npm Attack Attributed to North Korea Logo

A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

0
The Anatomy of a Malicious Package Logo

Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.

0