Skip to content

Reaishma/SecurePass-Analyzer-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

100 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SecurePass Analyzer

SecurePass Analyzer is a comprehensive password security analysis tool built with a modern full-stack architecture. The application provides real-time password strength analysis, security compliance checking, threat intelligence assessment, and cryptographic analysis. It features a clean, professional interface designed for security professionals and end users alike

secure pass

🚀 Live Demo

View Demo https://reaishma.github.io/SecurePass-Analyzer-/

Features

Core Security Analysis

  • Real-time Password Analysis: Instant security assessment as you type
  • OWASP Compliance: Complete 8-point validation system
  • SANS Guidelines: Enterprise security standards compliance
  • Strength Scoring: 5-level password strength assessment
  • Security Posture: Overall risk assessment with actionable recommendations

Advanced Security Features

threat intelligence

  • Threat Intelligence: Simulated IBM X-Force and AlienVault integration
  • Breach Database Matching: Checks against known security breaches
  • Common Password Detection: Validates against top 10,000 passwords
  • Cryptographic Analysis: SHA-256 and bcrypt hash generation
  • Entropy Calculation: Mathematical randomness assessment

Security Testing Tools Integration

  • Metasploit: Vulnerability scanning simulation
  • Burp Suite: Penetration testing assessment
  • Nessus: Risk assessment and scoring
  • Crack Time Estimation: Modern hardware attack simulations

Password Generation

password generator

  • Secure Password Generator: Cryptographically secure random generation
  • Customizable Options: Length, character sets, complexity
  • Strength Validation: Generated passwords automatically analyzed
  • One-click Application: Seamless integration with analyzer

Data Models

  • Users: Basic user authentication schema
  • Password Analysis: Comprehensive analysis results storage with JSON fields for complex data
  • Shared Schema: Zod validation schemas for type-safe data transfer

UI Components

  • Security Dashboard: Real-time analysis display
  • Password Input: Debounced analysis trigger with strength visualization
  • Compliance Cards: OWASP, SANS, and threat intelligence results
  • Password Generator: Configurable secure password generation
  • Recommendations Engine: Contextual security advice

Data Flow

  1. Password Input: User types password with 500ms debounce
  2. Analysis Pipeline: Concurrent execution of all security checks
  3. Results Aggregation: Combine scores and recommendations
  4. Database Storage: Persist analysis with hashed password
  5. UI Updates: Real-time dashboard updates via React Query

Analysis Components

  • Strength scoring (0-100 scale)
  • OWASP compliance (8 criteria)
  • SANS guidelines validation
  • Threat intelligence lookup
  • Cryptographic hash generation
  • Security recommendations

External Dependencies

Core Libraries

  • @neondatabase/serverless: PostgreSQL connection driver
  • drizzle-orm: Type-safe database ORM
  • @tanstack/react-query: Server state management
  • @radix-ui/*: Accessible UI primitives
  • class-variance-authority: Type-safe CSS class variants
  • zod: Runtime type validation

Development Tools

  • tsx: TypeScript execution for development
  • esbuild: Production build bundling
  • @replit/vite-plugin-*: Replit-specific development enhancements

Security Libraries

  • bcrypt: Password hashing (planned integration)
  • crypto: Node.js cryptographic utilities
  • date-fns: Date manipulation for analysis timestamps

Architecture

Frontend

  • React 18 with TypeScript for type safety
  • Tailwind CSS with shadcn/ui components
  • TanStack Query for server state management
  • Wouter for lightweight routing
  • Vite for development and build optimization

Backend

  • Node.js with Express.js REST API
  • TypeScript with ES modules
  • bcrypt for password hashing
  • Crypto module for secure operations
  • In-memory storage with planned PostgreSQL integration

Security Services

  • PasswordAnalysisService: OWASP and SANS compliance checking
  • ThreatIntelligenceService: Breach database and threat assessment
  • CryptoService: Cryptographic operations and hash generation

Getting Started

Prerequisites

  • Node.js 20+
  • npm or yarn package manager

Installation

  1. Clone the repository:
git clone <repository-url>
cd securepass-analyzer
  1. Install dependencies:
npm install
  1. Start the development server:
npm run dev
  1. Open your browser to http://localhost:5000

API Endpoints

Password Analysis

POST /api/password/analyze
Body: { "password": "string" }

Password Generation

POST /api/password/generate
Body: {
  "length": number,
  "includeUppercase": boolean,
  "includeLowercase": boolean,
  "includeNumbers": boolean,
  "includeSymbols": boolean
}

Threat Intelligence

POST /api/threat-intelligence/check
Body: { "password": "string" }

Analysis History

GET /api/password/history

Security Standards

Security standards

OWASP Compliance Checks

The application implements the OWASP (Open Web Application Security Project) password security guidelines as outlined in the OWASP Authentication Cheat Sheet and Application Security Verification Standard (ASVS).

OWASP Foundation Attribution: The password validation criteria are based on OWASP's internationally recognized security standards for web application security. OWASP is a nonprofit foundation that works to improve the security of software.

  • ✅ Minimum length (8+ characters) - OWASP ASVS V2.1.1
  • ✅ Uppercase letter requirement - OWASP ASVS V2.1.2
  • ✅ Lowercase letter requirement - OWASP ASVS V2.1.2
  • ✅ Numeric character requirement - OWASP ASVS V2.1.2
  • ✅ Special character requirement - OWASP ASVS V2.1.2
  • ✅ Common pattern detection - OWASP ASVS V2.1.7
  • ✅ Dictionary word prevention - OWASP ASVS V2.1.7
  • ✅ Personal information detection - OWASP ASVS V2.1.7

SANS Guidelines Validation

The application follows SANS Institute cybersecurity best practices and password policy recommendations from their security awareness training and incident response guidelines.

SANS Institute Attribution: The password complexity and security posture assessments are based on SANS Institute's cybersecurity training materials and industry best practices. SANS is a private U.S. company founded in 1989 that specializes in cybersecurity and secure coding training.

  • ✅ Enhanced length requirements (12+ characters) - SANS Password Policy Guide
  • ✅ Complexity scoring (Low/Medium/High) - SANS Security Awareness Training
  • ✅ Entropy level calculation - SANS Cryptographic Standards
  • ✅ Uniqueness verification - SANS Incident Response Guidelines
  • ✅ Keyboard pattern detection - SANS Security Awareness Training

Threat Intelligence Features

  • 🔍 Breach database matching
  • 🔍 Common password list checking
  • 🔍 Threat scoring (0-10 scale)
  • 🔍 Risk level assessment
  • 🔍 IBM X-Force simulation
  • 🔍 AlienVault reputation checking

Cloud Security Integration

metasploit

Azure Security Center Compatible

  • Security posture management
  • Compliance reporting
  • Risk assessment metrics
  • Threat intelligence correlation

Security Testing Tools

  • Metasploit: Vulnerability assessment simulation
  • Burp Suite: Web application security testing
  • Nessus: Network vulnerability scanning
  • Penetration Testing: Automated security assessment

Cryptographic Features

Hash Generation

  • SHA-256: Fast hashing for comparison
  • bcrypt: Slow hashing for storage
  • Salt Generation: Unique salt per password
  • Iteration Control: Configurable work factor

Security Algorithms

  • Entropy Calculation: Shannon entropy measurement
  • Charset Analysis: Character set complexity scoring
  • Pattern Detection: Common sequence identification
  • Crack Time Estimation: Hardware-based attack simulation

Development

Project Structure

├── client/               # React frontend
│   ├── src/
│   │   ├── components/  # Reusable UI components
│   │   ├── pages/       # Application pages
│   │   ├── hooks/       # Custom React hooks
│   │   └── lib/         # Utility functions
├── server/              # Express backend
│   ├── services/        # Business logic
│   ├── routes.ts        # API endpoints
│   └── storage.ts       # Data persistence
├── shared/              # Shared types and schemas
└── components.json      # shadcn/ui configuration

Available Scripts

  • npm run dev - Start development server
  • npm run build - Build for production
  • npm run preview - Preview production build
  • npm run lint - Run ESLint
  • npm run test - Run tests

Security Best Practices

Password Requirements

  • Minimum 8 characters (12+ recommended)
  • Mix of uppercase, lowercase, numbers, symbols
  • Avoid common patterns and dictionary words
  • No personal information inclusion
  • Regular rotation recommended

Implementation Security

  • All passwords hashed with bcrypt
  • No plain text storage
  • Secure random generation
  • Protection against timing attacks
  • Input validation and sanitization

Deployment Strategy

Development

  • Local Development: Vite dev server with Express middleware
  • Hot Reloading: Full-stack hot module replacement
  • Database: Neon serverless PostgreSQL with connection pooling

Production Build

  • Frontend: Vite build to dist/public with asset optimization
  • Backend: ESBuild bundle to dist/index.js with external dependencies
  • Database: Drizzle migrations with schema push capability

Environment Configuration

  • DATABASE_URL: Required PostgreSQL connection string
  • NODE_ENV: Development/production environment flag

Browser Support

  • Chrome 90+
  • Firefox 88+
  • Safari 14+
  • Edge 90+

Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Commit your changes
  4. Push to the branch
  5. Create a Pull Request

License

This project is licensed under the GNU GENERAL PUBLIC LICENSE Version 3

Acknowledgments

  • OWASP Foundation - This project implements security guidelines from the Open Web Application Security Project (OWASP), a nonprofit foundation that works to improve the security of software. The password validation criteria are based on OWASP's Authentication Cheat Sheet and Application Security Verification Standard (ASVS). Learn more at owasp.org.

  • SANS Institute - Password complexity and security posture assessments follow SANS Institute's cybersecurity best practices and training materials. SANS is a private U.S. company founded in 1989 that specializes in cybersecurity and secure coding training. Learn more at sans.org.

  • IBM X-Force - Threat intelligence simulation inspired by IBM X-Force threat intelligence platform and research methodology.

  • AlienVault (now AT&T Cybersecurity) - Reputation system concepts based on AlienVault's Open Threat Exchange (OTX) platform.

  • bcrypt library - Secure password hashing implementation using the bcrypt adaptive hashing function.

  • React and TypeScript communities - Modern web development frameworks and type safety systems.

Security Standards Compliance

This application is designed to help developers and security professionals understand and implement:

  • OWASP ASVS (Application Security Verification Standard) requirements for authentication
  • SANS password policy guidelines and security awareness training principles
  • NIST Special Publication 800-63B Digital Identity Guidelines
  • ISO 27001 information security management standards

Legal and Compliance Notice

The security standards and guidelines implemented in this application are based on publicly available documentation and best practices from:

  • OWASP Foundation (Creative Commons Attribution-ShareAlike 3.0 license)
  • SANS Institute publicly available training materials and guidelines
  • NIST Cybersecurity Framework and special publications
  • Industry standard cryptographic practices and algorithms

Support

For support, please create an issue in the GitHub repository or contact the developer.


About

A comprehensive password strength checker built with enterprise-grade security standards, incorporating OWASP and SANS guidelines, threat intelligence, and cryptographic analysis.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors