Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles
☆20Mar 24, 2021Updated 5 years ago
Alternatives and similar repositories for audit-node-modules-with-yara
Users that are interested in audit-node-modules-with-yara are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terraform module for AWS lambda deployments with multiple triggers☆11Jan 27, 2022Updated 4 years ago
- exploit-db备份☆15Jan 5, 2022Updated 4 years ago
- Improve your git workflow with customizable and runnable blocks☆16Jun 14, 2024Updated last year
- Example of using Amazon EventBridge OpenAPI schemas with TypeScript and the AWS CDK☆14Oct 10, 2022Updated 3 years ago
- ☆11Aug 8, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Simple yara decompiler☆17Apr 8, 2017Updated 8 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- ☆12Jan 4, 2023Updated 3 years ago
- ☆11Feb 1, 2025Updated last year
- A text classifier in Python using classification algorithms of machine learning (Support vector machines, Naïve Bayes classifier) to dete…☆11Dec 11, 2017Updated 8 years ago
- Google Cloud Connectivity Tests☆11Oct 8, 2019Updated 6 years ago
- ⁉️ AsyncAF (A.K.A. async-af, A.K.A. Async/Await Fun) - chainable asynchronous JavaScript methods that mirror their native counterparts an…☆13Mar 17, 2026Updated last week
- Augmented Socket API selecting the best suitable access network based on application needs and network performance characteristics.☆14Mar 29, 2020Updated 5 years ago
- Combine vim-projectionist with vim-dirvish!☆12May 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 💪 Javascript Set on steroids.☆18Feb 21, 2024Updated 2 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- A modern KiCad template w/ one command to build☆36Mar 5, 2026Updated 3 weeks ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- Malware detection in android using permissions, API calls, CFGs as features☆18Oct 10, 2017Updated 8 years ago
- Instrument a JavaScript class (or object) so that anytime a method function is called it gets logged to the console.☆35Oct 27, 2020Updated 5 years ago
- WavingSketch: An Unbiased and Generic Sketch for Finding Top-k Items in Data Streams☆14Jul 7, 2024Updated last year
- 《深入理解IAST交互式应用安全测试》Interactive Application Security Testing.☆13Oct 20, 2022Updated 3 years ago
- 🐑 Monitor the status of a folder on your system☆12Jan 13, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An Android application, designed as a reference point, that implements an array of tamper and root detection methods - inspired by Google…☆15Jul 21, 2020Updated 5 years ago
- Human Resource Management App☆14Aug 5, 2016Updated 9 years ago
- An express middleware that makes it easy to write web services that follow an Open API specification.☆17Mar 2, 2023Updated 3 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆21May 3, 2019Updated 6 years ago
- ☆13Mar 3, 2026Updated 3 weeks ago
- ☆13Aug 20, 2025Updated 7 months ago
- CC1200 HAT - RF board☆21May 28, 2025Updated 9 months ago
- Sphero Star Wars BB8 controlled via Xbox controller and Myo armband! The droid you're looking for!☆19Jan 1, 2018Updated 8 years ago
- Online ERC20 verifier based on tinchoabbate's slither-scripts☆13Nov 1, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An example Slim Framework project that 2FA authentication Google Authenticator☆15Mar 30, 2015Updated 10 years ago
- Classifying English spoken digit by Hidden Markov Model☆13Jun 16, 2019Updated 6 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Jun 14, 2017Updated 8 years ago
- 🚰 Convert Node.js streams to streaming iterables☆19Jul 10, 2024Updated last year
- WIP Cluster toolkit for consistent hashing distributed systems☆11May 15, 2023Updated 2 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Make curl easier with ethereum bash completions.☆14Apr 19, 2020Updated 5 years ago