Audit Node Modules With YARA Rules Logo

Audit Node Modules With YARA Rules

0
Free
Visit Website

The purpose of this tool is to run a given set of YARA rules against the given node_module folder. With this approach, We can define YARA rules to identify suspicious scripts which are injected into node packages. Mainly inspired by these articles: Malicious packages in npm, Malicious NPM packages target Amazon, Slack with new dependency attacks, Hunting malicious NPM packages. This package can be added to the CI/CD pipeline. Software Requirements: Docker, Docker Compose, Makefile. How to use: Clone this repo, execute audit operation with `make` command, report available in `artifacts/output.json`.

FEATURES

ALTERNATIVES

Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

A tool to capture all the git secrets by leveraging multiple open source git searching tools.

OWASP Project for making vulnerability management easier.

Check for known vulnerabilities in your Node.js installation.

Automate the search for Exploits and Vulnerabilities in important databases.

Python-based extension for integrating a Yara scanner into Burp Suite for on-demand website scans based on custom rules.

PINNED