npm-scan Logo

npm-scan

0
Free
Visit Website

An extensible, heuristic-based vulnerability scanning tool for installed npm packages. WARNING: npm-scan is still very much in early development and should not be used in production. We are developing more accurate heuristics. We are actively seeking new contributors with ideas for additional heuristics, so please do get in touch :) Another important project you can contribute to is npm-zoo, where past malicious packages are uploaded for research. We need more examples in order to develop better heuristics. Quickstart: npm install https://github.com/spaceraccoon/npm-scan.git npx npm-scan Usage: Usage: npx npm-scan [options] Options: -V, --version output the version number -p, --packages-dir <dir path> set directory path for packages. defaults to node_modules -e, --exclude-heuristics <items> exclude comma-separated list of heuristics -o, --output <file path> set file path for JSON output -v, --verbose print more details for each package scan -s, --strict include low-risk heuristics -h, --help output usage information Developing: git clone https://github.com/spaceraccoon/npm-scan.git npm link npm run scan npm run test npm run lint Push changes on a separate branch. To add a new

FEATURES

ALTERNATIVES

A tool for scanning websites with open .git repositories and dumping their content for Bug Hunting/Pentesting Purposes.

A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages

A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.

A virtual machine with numerous security vulnerabilities for testing exploits with Metasploit.

A fuzzer for detecting open redirect vulnerabilities

A continuous threat exposure management platform that provides automated vulnerability scanning for internet-facing assets with varying service tiers for different organizational needs.

A ruby script that scans for vulnerable 3rd-party web applications

kube-hunter hunts for security weaknesses in Kubernetes clusters.