mikesamuel / node-sec-patterns
Security design pattern support for Node.js
☆24Updated 5 years ago
Alternatives and similar repositories for node-sec-patterns:
Users that are interested in node-sec-patterns are comparing it to the libraries listed below
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆19Updated 5 years ago
- rules for scanjs functionality☆28Updated 3 years ago
- Discussion area for security aspects of ECMAScript☆64Updated 7 years ago
- Security advisories for Node.js and the JavaScript ecosystem.☆41Updated 3 years ago
- Node.js vulnerability scanner☆103Updated 5 years ago
- Some thoughts on how Node.js might respond to a changing security environment☆173Updated 6 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- Checks filenames to be committed against a library of filename rules to prevent sensitive files in Git☆66Updated last week
- Automatically Preventing Code Injection Attacks on Node.js☆78Updated 2 years ago
- umbrella config to achieve scanjs-like functionality through eslint☆88Updated 3 years ago
- TSLint security rules☆70Updated 4 years ago
- Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]☆43Updated 9 months ago
- Policy management tool for Node.js☆22Updated 2 years ago
- Content-Security-Policy report aggregator/analyzer☆55Updated 4 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆50Updated 4 years ago
- It is a note about security on nodejs☆48Updated 6 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆56Updated 7 months ago
- JSON.parse() drop-in replacement with prototype poisoning protection☆173Updated 5 months ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Updated 3 months ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- ☆39Updated 2 years ago
- Node in the middle. Intercept calls to the node binary and set some node specific flags before running a program☆25Updated 6 years ago
- Intentionally Vulnerable Node Applications☆16Updated 5 years ago
- An SSRF-preventing wrapper around Node's request module☆26Updated 6 years ago
- ☆39Updated 4 years ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆56Updated this week
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- An ultra-compact intro (or refresher) to Web Application Security.☆31Updated 7 years ago
- Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles☆20Updated 4 years ago
- RegEx Denial of Service (ReDos) Scanner☆163Updated 7 years ago