Audit Node Modules With YARA Rules Logo

Audit Node Modules With YARA Rules

0
Free
Visit Website

The purpose of this tool is to run a given set of YARA rules against the given node_module folder. With this approach, We can define YARA rules to identify suspicious scripts which are injected into node packages. Mainly inspired by these articles: Malicious packages in npm, Malicious NPM packages target Amazon, Slack with new dependency attacks, Hunting malicious NPM packages. This package can be added to the CI/CD pipeline. Software Requirements: Docker, Docker Compose, Makefile. How to use: Clone this repo, execute audit operation with `make` command, report available in `artifacts/output.json`.

FEATURES

ALTERNATIVES

A LinkedIn reconnaissance tool for gathering information about companies and individuals on the platform.

Vulnerable Android application for learning security concepts.

A hosted web application security testing tool that enables security researchers to register, activate their accounts, and scan web applications for vulnerabilities.

Powerful PowerShell script for identifying missing software patches for local privilege escalation vulnerabilities.

A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.

A repository containing hourly-updated data dumps of bug bounty platform scopes

A comprehensive guide to Android Security

A platform to learn SQL injection techniques and methods

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved