306 skills found · Page 11 of 11
pkarpovich / Vpn Exit NodeTailscale Exit Node & OpenVPN Controller: Automate and manage your traffic exit node with Tailscale integration and easily toggle OpenVPN for enhanced privacy and security
KOSASIH / PiGuardPiGuard is an AI-powered, decentralized security and monitoring app designed for Pi Network users. Its primary goal is to safeguard users' Pi nodes from potential security threats, ensuring the integrity of the network and preventing fraudulent activities.
EmadYaY / Oauth LabInteractive OAuth 2.0 / OIDC security lab, Auth Code + PKCE, Client Credentials, Device Flow, CSRF, Open Redirect, Consent Phishing. Single Node.js file, auto-detects host IP.
atharvdange618 / ReiatsuA minimal, type-safe HTTP framework for Node.js built from first principles using zero dependencies. Production-ready with comprehensive security, performance optimizations, and modern developer experience.
alexmackey / HackTheCatHackthecat is a vulnerable node express/mysql app intended for teaching, demonstrating and practicing common security issues and defensive techniques. DO NOT INSTALL ON INTERNET FACING MACHINE OR SENSITIVE NETWORK
vedsaxena6987 / Your AI Powered Code Security Guardian MainProject Approach: Shield AI is developed as a Node.js CLI tool using: Google Generative AI (Gemini-1.5 Pro) for security analysis. Chalk, Ora, and Inquirer for an interactive UI. Chokidar for real-time file monitoring. File System (fs) module for secure backups and modifications.
aarav12e / Note Application MERN🗒️ Note Application (MERN) is a full-stack note-taking web app built with MongoDB, Express, React, and Node.js that lets users create, update, and delete notes with titles and descriptions. 🔐 It includes a fully functional REST API with real-world features like rate limiting using Upstash Redis for performance and security.
rootFaheem / An Enhanced Certificate Less Algorithm For Wireless Sensor Network ReactReact implementation of ECAWSN protocol. Authentication of Sensor nodes is a major security issues in WSN. Lack of authentication yields security attacks like man in middle attack, wormhole attack etc. One of the way of achieving authentication is the use of Digital Signature. Certificateless Signature scheme is an important key parameter for improving the performance of WSN. However, the energy constraints in WSN demands Certificateless Authentication schemes. The proposed scheme is more efficient by eliminating the need of certificate authority centers. The simulation result of proposed algorithm and technique can approximately achieve 6-15% reduction of energy dissipation and provide secured transmission using certificate-less algorithm.
sriprav / BlockchainBlockchain technology has been linked with Internet of Things for a long time now. There are many issues that are hinder the implementation of IoT applications at a large scale. Surveys and studies from multiple sources reveal that security threats and data privacy are still the primary concerns. These problems are well known and solutions exist for these problems in the IT industry. However, traditional IT security solutions cannot be applied to IoT for various reasons spanning from type of devices to sheer volume of devices. Unfortunately, like in any other industry, security is often disregarded in the IoT domain as well, and most of the resources are allocated to application development and device hardware. So, the search for a silver bullet to overcome these inhibitors has been going on for a while. After Bitcoin became prominent, people started to realize the potential of the underlying distributed ledger (blockchain) technology and considered it as a true innovation. Rather than facilitating a peer-to-peer digital payment system involving a cryptocurrency, the blockchain technology is viewed as a mechanism that provides device identity, secure data transfer, and immutable data storage. All these features can be implemented without any centralized authority and a completely transparent system with auditable cryptographic proofs. Our aim through this research project is to get a deep level understanding of the blockchain technology and study some of the widely used blockchain frameworks including Ethereum, Eris, and IOTA. We will further examine the exclusive features offered by each of these frameworks and define their target use cases. While researching about each framework, we plan to deploy a blockchain in the local network i.e., private blockchain and operate on it from different devices running on various operating systems. In each deployment, we will observe the functional issues and benchmark system requirements for running different types of nodes. Also, we will study different algorithms involved in each framework, compare them with each other, and derive their suitability for IoT. Ultimately, our aim is to determine the most suitable blockchain architecture for the IoT ecosystem. A high-level comparison of the researched architectures will be provided so that managers and developers can quickly decide on a suitable framework for their application or use case depending upon the requirements. For each architecture, a set of sample use cases and on-going projects will be discussed to get an idea of the usage of that architecture in the real world.
cybersmithio / Web Login SiteA basic Node.js website with an authenticated section. This is to test web app security scanner logins.
recallfx / Node Red Contrib Eufy SecurityEufy security node for Node RED
cfpb / VaxCheck your Node project for npm security best practices.
dcortesnet / Nodejs Express Security Best PracticesRepository with examples of best security practices in Node.js express projects. DDoS, cors, timeout and more.
jesterb0206 / NatoursA RESTful API / web app with authentication, Node.js security, payment processing and more!
neilpricetw / Kubernetes Security Nodejs MysqlNo description available
lirantal / Nodejssecurity Headers HstsExercise resources about HTTP security headers in Node.js and Express applications
SamuraiWTF / Musashi JsA set of Node applications for demonstrating web security concepts. Created for use in Samurai WTF.
ialexmp / Salmonella AttackThe paper explores Salmonella Attacks in Blockchain, emphasizing the importance of security measures like node authentication to prevent disruptions, while also providing insights into detection methods and countermeasures.
stawuah / GuardifyGuardify is a Node.js middleware designed to enhance the security of your web applications by setting various HTTP security headers. It is easy to integrate and customizable based on your specific security requirements.
Athexblackhat / ATHEX RATATHEX-RAT is a web-based Remote Administration Tool ( android-RAT ) for managing Android devices via a secure Node.js dashboard. Supports real-time monitoring, data extraction, and remote control for ethical hacking, security research, and pentesting.