Disclaimer: This tool relies on the NVD API and may not catch 100% of vulnerabilities or zero-day exploits. Always perform independent audits before shipping.
Drag & Drop your package.json
or click to browse files
OR
Scanning dependencies against NVD...
This might take a few moments...
0 Vulnerabilities Found
Scanned 0 dependencies.
Disclaimer: This tool performs a superficial perimeter scan evaluating HTTP headers, standard ports, and SSL configuration. It is not a replacement for a penetration test. Only scan domains/IPs you are authorized to test.
Probing targets and analyzing headers...
This can take up to 20 seconds depending on timeout limits.
0 Vulnerabilities Found
Scanned Target.
Scan Details
Identified Vulnerabilities
Warning: Never paste actual production secrets. Only paste `.env.example` templates to check for missing required keys or hardcoded values.
Disclaimer: Generated files are templates. You should review and modify the content to fit your specific project details.
Disclaimer: Visualizations are estimations based on uncompressed package metadata and may differ from your final production build.
Fetching bundle sizes from Bundlephobia...
Analyzing 0/0 packages
0 KB Total Estim. Size
Analyzed 0 dependencies.
Disclaimer: Ensure you are not sharing proprietary or sensitive algorithms before generating snippets for social media.
Disclaimer: We are not lawyers. Information provided here does not constitute legal advice. Please consult a professional for complex licensing needs.
100% Client-Side Privacy: Your token never leaves the browser. This tool decodes JWTs locally.
Translate obscure Cron syntax into plain English instantly.
Every Minute
Strip bloated metadata, comments, and empty attributes from raw SVG code for smaller bundle sizes.
Generate cohesive shade palettes from a single HEX code.
100% Client-Side Private JSON Formatting & Beautification.
Warning: Paste raw code or configuration files to scan for hardcoded AWS keys, Stripe tokens, RSA keys, and passwords. Scanning is 100% private and happens locally in your browser.
Static Application Security Testing (SAST): Paste PHP or JS code. This tool uses Regex to hunt for common OWASP injection vulnerabilities (eval, innerHTML, raw SQL inputs).
CVE Scanner: Paste your `composer.lock`, `package-lock.json`, or `requirements.txt` to scan for known vulnerabilities.
DNS Path Tracer: Visualize the journey of a DNS query from Root to Authoritative servers. Identify latency bottlenecks and misconfigurations.
IP Geolocation & ASN Lookup: Query global BGP routing tables to identify the physical location, ISP, and organization of an IP address.
Multi-DNS & Poisoning Check: Resolve records against pristine public resolvers (Cloudflare/Google) and compare them directly with your local network DNS.
Browser vs Server Firewall Test: Simultaneously test connectivity to a target host/port from your local browser (Local ISP/Firewall) and from this server (Data Center Firewall).
| Perspective | Target | Status | Time / Detail |
|---|
Check out these curated deals for developers to support Hash64.org.
Resources & Articles: A curated list of internal articles and external tools to help you level up your development and security game.