Audit Node Modules With YARA Rules Logo

Audit Node Modules With YARA Rules

0
Free
Updated 11 March 2025
Visit Website

The purpose of this tool is to run a given set of YARA rules against the given node_module folder. With this approach, We can define YARA rules to identify suspicious scripts which are injected into node packages. Mainly inspired by these articles: Malicious packages in npm, Malicious NPM packages target Amazon, Slack with new dependency attacks, Hunting malicious NPM packages. This package can be added to the CI/CD pipeline. Software Requirements: Docker, Docker Compose, Makefile. How to use: Clone this repo, execute audit operation with `make` command, report available in `artifacts/output.json`.

FEATURES

SIMILAR TOOLS

Open source web application security scanner with 200+ vulnerability identification capabilities.

Nmap is an essential network scanning tool used for network security auditing and status monitoring.

Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.

Check for known vulnerabilities in your Node.js installation.

A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.

A tool for detecting and exploiting vulnerabilities in web applications

OWASP Project for making vulnerability management easier.

Open source security auditing tool to search and dump system configuration.

A tool for detecting secrets in your code

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved