dargslan-security-quiz 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +21 -0
- package/README.md +51 -0
- package/index.js +127 -0
- package/package.json +22 -0
package/LICENSE
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
MIT License
|
|
2
|
+
|
|
3
|
+
Copyright (c) 2026 Dargslan
|
|
4
|
+
|
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
|
7
|
+
in the Software without restriction, including without limitation the rights
|
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
|
10
|
+
furnished to do so, subject to the following conditions:
|
|
11
|
+
|
|
12
|
+
The above copyright notice and this permission notice shall be included in all
|
|
13
|
+
copies or substantial portions of the Software.
|
|
14
|
+
|
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
21
|
+
SOFTWARE.
|
package/README.md
ADDED
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
# π Dargslan Cybersecurity Quiz
|
|
2
|
+
|
|
3
|
+
[](https://www.npmjs.com/package/dargslan-security-quiz)
|
|
4
|
+
[](https://opensource.org/licenses/MIT)
|
|
5
|
+
|
|
6
|
+
**Interactive Cybersecurity quiz right in your terminal.** Test your knowledge of penetration testing, forensics, cryptography, web security, incident response, and compliance.
|
|
7
|
+
|
|
8
|
+
## Quick Start
|
|
9
|
+
|
|
10
|
+
```bash
|
|
11
|
+
npx dargslan-security-quiz
|
|
12
|
+
```
|
|
13
|
+
|
|
14
|
+
## Features
|
|
15
|
+
|
|
16
|
+
- π― **32+ expert questions** across 6 categories
|
|
17
|
+
- π **Network Security** β firewalls, IDS/IPS, DDoS, Zero Trust
|
|
18
|
+
- π **Cryptography** β symmetric/asymmetric, hashing, PFS, certificates
|
|
19
|
+
- π― **Penetration Testing** β Nmap, Metasploit, privilege escalation, reverse shells
|
|
20
|
+
- π¨ **Incident Response** β NIST framework, forensics, IoCs
|
|
21
|
+
- πΈοΈ **Web Security** β SQLi, XSS, CSRF, OWASP Top 10, WAF
|
|
22
|
+
- π **Compliance** β GDPR, SOC 2, CIA triad, least privilege, risk assessment
|
|
23
|
+
- π **4 game modes** β Quick, Full, By Category, Speed Round
|
|
24
|
+
- π‘ Detailed explanations after each answer
|
|
25
|
+
- π Personalized book recommendations
|
|
26
|
+
- π Zero dependencies
|
|
27
|
+
|
|
28
|
+
## Who Is This For?
|
|
29
|
+
|
|
30
|
+
- π **OSCP/CEH/CompTIA Security+** certification candidates
|
|
31
|
+
- πΌ **Security analyst** interview prep
|
|
32
|
+
- π **Penetration testers** staying sharp
|
|
33
|
+
- π **Students** learning cybersecurity
|
|
34
|
+
|
|
35
|
+
## More Tools
|
|
36
|
+
|
|
37
|
+
- π§ `npx dargslan-linux-quiz` β General Linux
|
|
38
|
+
- βοΈ `npx dargslan-sysadmin-quiz` β System Administration
|
|
39
|
+
- π³ `npx dargslan-devops-quiz` β DevOps & Cloud
|
|
40
|
+
- π `npx linux-cheatsheet-cli` β Command Reference
|
|
41
|
+
- π‘οΈ `npx server-hardening-checklist` β Security Audit
|
|
42
|
+
|
|
43
|
+
## Learn More
|
|
44
|
+
|
|
45
|
+
- π [210+ IT eBooks](https://dargslan.com/books)
|
|
46
|
+
- π [260+ Cheat Sheets](https://dargslan.com/cheat-sheets)
|
|
47
|
+
- π [IT Blog](https://dargslan.com/blog)
|
|
48
|
+
|
|
49
|
+
## License
|
|
50
|
+
|
|
51
|
+
MIT β [dargslan.com](https://dargslan.com)
|
package/index.js
ADDED
|
@@ -0,0 +1,127 @@
|
|
|
1
|
+
#!/usr/bin/env node
|
|
2
|
+
|
|
3
|
+
const readline = require('readline');
|
|
4
|
+
|
|
5
|
+
const c = {
|
|
6
|
+
reset: '\x1b[0m', bold: '\x1b[1m', dim: '\x1b[2m',
|
|
7
|
+
red: '\x1b[31m', green: '\x1b[32m', yellow: '\x1b[33m',
|
|
8
|
+
blue: '\x1b[34m', magenta: '\x1b[35m', cyan: '\x1b[36m', white: '\x1b[37m',
|
|
9
|
+
bgGreen: '\x1b[42m', bgRed: '\x1b[41m',
|
|
10
|
+
};
|
|
11
|
+
|
|
12
|
+
const CATEGORIES = [
|
|
13
|
+
{ name: 'Network Security', icon: 'π' },
|
|
14
|
+
{ name: 'Cryptography', icon: 'π' },
|
|
15
|
+
{ name: 'Penetration Testing', icon: 'π―' },
|
|
16
|
+
{ name: 'Incident Response', icon: 'π¨' },
|
|
17
|
+
{ name: 'Web Security', icon: 'πΈοΈ' },
|
|
18
|
+
{ name: 'Compliance & Governance', icon: 'π' },
|
|
19
|
+
];
|
|
20
|
+
|
|
21
|
+
const QUESTIONS = [
|
|
22
|
+
{ category: 0, difficulty: 1, question: 'What does a firewall do?', options: ['Speeds up internet', 'Filters network traffic based on rules', 'Encrypts data', 'Manages users'], answer: 1, explanation: 'Firewalls control traffic flow by allowing or blocking packets based on IP, port, and protocol rules.' },
|
|
23
|
+
{ category: 0, difficulty: 1, question: 'What is a VPN?', options: ['A virus scanner', 'An encrypted tunnel for secure communication over public networks', 'A firewall type', 'A DNS server'], answer: 1, explanation: 'VPNs encrypt traffic between endpoints, protecting data in transit and masking the user\'s IP address.' },
|
|
24
|
+
{ category: 0, difficulty: 2, question: 'What is a DDoS attack?', options: ['Data theft', 'Overwhelming a target with traffic from many sources', 'Password cracking', 'SQL injection'], answer: 1, explanation: 'Distributed Denial-of-Service attacks use botnets to flood targets with traffic, making services unavailable.' },
|
|
25
|
+
{ category: 0, difficulty: 2, question: 'What does an IDS do?', options: ['Blocks attacks', 'Detects and alerts on suspicious network activity', 'Encrypts traffic', 'Manages certificates'], answer: 1, explanation: 'Intrusion Detection Systems (IDS) monitor and alert. IPS (Prevention Systems) can also block threats automatically.' },
|
|
26
|
+
{ category: 0, difficulty: 3, question: 'What is network segmentation?', options: ['Splitting cables', 'Dividing a network into isolated zones to limit lateral movement', 'Load balancing', 'DNS partitioning'], answer: 1, explanation: 'Segmentation limits blast radius β if one zone is compromised, attackers cannot easily reach other segments.' },
|
|
27
|
+
{ category: 0, difficulty: 3, question: 'What is Zero Trust Architecture?', options: ['No security needed', 'Never trust, always verify β authenticate every request regardless of location', 'Zero-cost security', 'No firewall needed'], answer: 1, explanation: 'Zero Trust assumes no implicit trust. Every access request is verified with identity, device, and context checks.' },
|
|
28
|
+
{ category: 1, difficulty: 1, question: 'What is encryption?', options: ['Data compression', 'Converting data to an unreadable format using a key', 'Data deletion', 'File copying'], answer: 1, explanation: 'Encryption protects data confidentiality. Symmetric (AES) uses one key; asymmetric (RSA) uses key pairs.' },
|
|
29
|
+
{ category: 1, difficulty: 2, question: 'What is the difference between symmetric and asymmetric encryption?', options: ['No difference', 'Symmetric uses one shared key; asymmetric uses a public/private key pair', 'Asymmetric is weaker', 'Symmetric is newer'], answer: 1, explanation: 'Symmetric (AES) is faster for bulk data. Asymmetric (RSA/ECC) is used for key exchange and digital signatures.' },
|
|
30
|
+
{ category: 1, difficulty: 2, question: 'What is a hash function?', options: ['An encryption method', 'A one-way function producing a fixed-size digest from any input', 'A key generator', 'A compression algorithm'], answer: 1, explanation: 'Hashes (SHA-256, bcrypt) are irreversible. Used for password storage, integrity verification, and digital signatures.' },
|
|
31
|
+
{ category: 1, difficulty: 3, question: 'What is a digital certificate?', options: ['A PDF document', 'A cryptographic file binding a public key to an identity, signed by a CA', 'An email attachment', 'A license key'], answer: 1, explanation: 'X.509 certificates enable TLS/SSL. Certificate Authorities (CAs) verify identity and sign certificates.' },
|
|
32
|
+
{ category: 1, difficulty: 3, question: 'What is Perfect Forward Secrecy (PFS)?', options: ['Unlimited encryption', 'Ensuring session keys cannot be compromised even if long-term keys are exposed', 'Faster encryption', 'No key needed'], answer: 1, explanation: 'PFS uses ephemeral Diffie-Hellman keys per session. Past communications stay safe even if the server key is compromised.' },
|
|
33
|
+
{ category: 2, difficulty: 1, question: 'What is penetration testing?', options: ['Stress testing servers', 'Authorized simulated attacks to find security vulnerabilities', 'Network monitoring', 'Code review'], answer: 1, explanation: 'Pentesters simulate real-world attacks with authorization to identify and report vulnerabilities before malicious actors.' },
|
|
34
|
+
{ category: 2, difficulty: 2, question: 'What is Nmap used for?', options: ['File transfer', 'Network discovery and port scanning', 'Password cracking', 'Web scraping'], answer: 1, explanation: '`nmap` discovers hosts, open ports, services, and OS versions. Essential reconnaissance tool for pentesters.' },
|
|
35
|
+
{ category: 2, difficulty: 2, question: 'What is Metasploit?', options: ['A firewall', 'A penetration testing framework for developing and executing exploits', 'An antivirus', 'A VPN'], answer: 1, explanation: 'Metasploit provides tools for vulnerability scanning, exploit development, and post-exploitation in authorized tests.' },
|
|
36
|
+
{ category: 2, difficulty: 3, question: 'What is privilege escalation?', options: ['Getting admin access legitimately', 'Exploiting flaws to gain higher-level permissions than initially granted', 'User registration', 'Access control'], answer: 1, explanation: 'Privilege escalation (vertical: userβroot, horizontal: userβanother user) is a key post-exploitation technique.' },
|
|
37
|
+
{ category: 2, difficulty: 3, question: 'What is a reverse shell?', options: ['A bash alias', 'A connection where the target machine connects back to the attacker', 'A protected shell', 'An SSH tunnel'], answer: 1, explanation: 'Reverse shells bypass firewalls by having the victim initiate an outbound connection to the attacker\'s listener.' },
|
|
38
|
+
{ category: 2, difficulty: 2, question: 'What are the phases of a penetration test?', options: ['Plan, Code, Deploy', 'Reconnaissance, Scanning, Exploitation, Post-exploitation, Reporting', 'Design, Build, Test', 'Install, Configure, Monitor'], answer: 1, explanation: 'The 5 phases ensure systematic testing: recon gathers info, scanning finds vulns, exploitation proves them, reporting documents all.' },
|
|
39
|
+
{ category: 3, difficulty: 1, question: 'What is an incident in cybersecurity?', options: ['A bug report', 'A security event that compromises confidentiality, integrity, or availability', 'A system update', 'A user complaint'], answer: 1, explanation: 'Incidents range from malware infections to data breaches. Every organization needs an incident response plan.' },
|
|
40
|
+
{ category: 3, difficulty: 2, question: 'What are the phases of incident response?', options: ['Detect, Fix, Forget', 'Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned', 'Alert, Block, Report', 'Scan, Patch, Monitor'], answer: 1, explanation: 'The NIST 6-phase framework ensures structured, repeatable incident handling with continuous improvement.' },
|
|
41
|
+
{ category: 3, difficulty: 2, question: 'What is the first priority when a breach is detected?', options: ['Delete all logs', 'Contain the threat to prevent further damage', 'Notify the press', 'Shut down everything'], answer: 1, explanation: 'Containment limits damage β isolate affected systems, block attacker IPs, revoke compromised credentials.' },
|
|
42
|
+
{ category: 3, difficulty: 3, question: 'What is digital forensics?', options: ['Deleting evidence', 'Collecting, preserving, and analyzing digital evidence from incidents', 'Hacking back', 'Data recovery'], answer: 1, explanation: 'Forensics follows chain of custody, creates forensic images, and analyzes artifacts without modifying original evidence.' },
|
|
43
|
+
{ category: 3, difficulty: 3, question: 'What are Indicators of Compromise (IoCs)?', options: ['Performance metrics', 'Artifacts that indicate a system has been breached (IPs, hashes, domains)', 'Audit logs', 'User reports'], answer: 1, explanation: 'IoCs include malicious IPs, file hashes, registry changes, unusual network patterns. Shared via STIX/TAXII standards.' },
|
|
44
|
+
{ category: 4, difficulty: 1, question: 'What is SQL injection?', options: ['Database backup', 'Inserting malicious SQL code through user input to manipulate databases', 'A query optimizer', 'Database migration'], answer: 1, explanation: 'SQLi exploits unsanitized input. Prevent with parameterized queries, prepared statements, and input validation.' },
|
|
45
|
+
{ category: 4, difficulty: 2, question: 'What is Cross-Site Scripting (XSS)?', options: ['Server-side scripting', 'Injecting malicious scripts into web pages viewed by other users', 'CSS styling', 'API testing'], answer: 1, explanation: 'XSS allows attackers to execute JavaScript in victims\' browsers. Prevent with output encoding and CSP headers.' },
|
|
46
|
+
{ category: 4, difficulty: 2, question: 'What is CSRF (Cross-Site Request Forgery)?', options: ['Code signing', 'Tricking authenticated users into performing unwanted actions', 'SSL certificate fraud', 'DNS spoofing'], answer: 1, explanation: 'CSRF exploits browser cookies to perform actions as the victim. Prevent with anti-CSRF tokens and SameSite cookies.' },
|
|
47
|
+
{ category: 4, difficulty: 3, question: 'What is the OWASP Top 10?', options: ['Top 10 websites', 'A regularly updated list of the most critical web application security risks', 'Top 10 antivirus tools', 'Top 10 programming languages'], answer: 1, explanation: 'OWASP Top 10 (2021): Broken Access Control, Cryptographic Failures, Injection, Insecure Design, Security Misconfiguration...' },
|
|
48
|
+
{ category: 4, difficulty: 3, question: 'What is a WAF (Web Application Firewall)?', options: ['A coding framework', 'A filter that protects web apps by inspecting HTTP traffic for attacks', 'A VPN', 'A CDN'], answer: 1, explanation: 'WAFs (ModSecurity, Cloudflare, AWS WAF) inspect requests for SQLi, XSS, and other attacks at the application layer.' },
|
|
49
|
+
{ category: 5, difficulty: 1, question: 'What is GDPR?', options: ['A programming language', 'EU regulation protecting personal data and privacy', 'A network protocol', 'A security tool'], answer: 1, explanation: 'GDPR requires organizations to protect EU citizens\' data with consent, breach notification, and right to erasure.' },
|
|
50
|
+
{ category: 5, difficulty: 2, question: 'What is the CIA triad?', options: ['A spy agency model', 'Confidentiality, Integrity, and Availability β core security principles', 'Certificate, Identity, Authentication', 'Cloud, Infrastructure, Application'], answer: 1, explanation: 'CIA triad: Confidentiality (prevent unauthorized access), Integrity (prevent tampering), Availability (ensure access).' },
|
|
51
|
+
{ category: 5, difficulty: 2, question: 'What is the principle of least privilege?', options: ['Give everyone admin access', 'Grant only the minimum permissions needed to perform a task', 'Remove all permissions', 'Use root for everything'], answer: 1, explanation: 'Least privilege reduces attack surface β users and processes only get permissions they absolutely need.' },
|
|
52
|
+
{ category: 5, difficulty: 3, question: 'What is SOC 2 compliance?', options: ['A coding standard', 'An audit framework for service organizations covering security, availability, and privacy', 'A network certification', 'A firewall standard'], answer: 1, explanation: 'SOC 2 audits verify trust service criteria: security, availability, processing integrity, confidentiality, and privacy.' },
|
|
53
|
+
{ category: 5, difficulty: 3, question: 'What is a risk assessment?', options: ['Performance review', 'Identifying, analyzing, and evaluating threats to determine appropriate controls', 'Network scan', 'Code review'], answer: 1, explanation: 'Risk assessments combine asset value, threat likelihood, and vulnerability severity to prioritize security investments.' },
|
|
54
|
+
];
|
|
55
|
+
|
|
56
|
+
const BOOKS = {
|
|
57
|
+
low: [
|
|
58
|
+
{ title: 'Cybersecurity Fundamentals', url: 'https://dargslan.com/book/cybersecurity-fundamentals' },
|
|
59
|
+
{ title: 'Network Security Basics', url: 'https://dargslan.com/book/network-security-basics' },
|
|
60
|
+
],
|
|
61
|
+
mid: [
|
|
62
|
+
{ title: 'Linux System Hardening', url: 'https://dargslan.com/book/linux-system-hardening' },
|
|
63
|
+
{ title: 'Linux Security Essentials', url: 'https://dargslan.com/book/linux-security-essentials' },
|
|
64
|
+
],
|
|
65
|
+
high: [
|
|
66
|
+
{ title: 'Ethical Hacking', url: 'https://dargslan.com/book/ethical-hacking' },
|
|
67
|
+
{ title: 'Mastering Kali Linux', url: 'https://dargslan.com/book/mastering-kali-linux' },
|
|
68
|
+
],
|
|
69
|
+
};
|
|
70
|
+
|
|
71
|
+
function shuffle(a){const b=[...a];for(let i=b.length-1;i>0;i--){const j=Math.floor(Math.random()*(i+1));[b[i],b[j]]=[b[j],b[i]];}return b;}
|
|
72
|
+
function ask(rl,q){return new Promise(r=>rl.question(q,a=>r(a.trim())));}
|
|
73
|
+
|
|
74
|
+
async function main(){
|
|
75
|
+
const rl=readline.createInterface({input:process.stdin,output:process.stdout});
|
|
76
|
+
console.log(`\n${c.bold}${c.cyan} ββββββββββββββββββββββββββββββββββββββββββββββββββββ`);
|
|
77
|
+
console.log(` β${c.white} π DARGSLAN CYBERSECURITY QUIZ π― ${c.cyan}β`);
|
|
78
|
+
console.log(` β${c.dim}${c.white} Pentest, forensics, web security & more ${c.cyan}β`);
|
|
79
|
+
console.log(` ββββββββββββββββββββββββββββββββββββββββββββββββββββ${c.reset}\n`);
|
|
80
|
+
console.log(`${c.dim} Powered by dargslan.com β 210+ IT eBooks${c.reset}\n`);
|
|
81
|
+
|
|
82
|
+
console.log(` ${c.green}[1]${c.reset} Quick (10) ${c.yellow}[2]${c.reset} Full (32) ${c.cyan}[3]${c.reset} Category ${c.red}[4]${c.reset} Speed\n`);
|
|
83
|
+
const mode=parseInt(await ask(rl,` ${c.bold}Choice [1-4]: ${c.reset}`))||1;
|
|
84
|
+
|
|
85
|
+
let qs;
|
|
86
|
+
if(mode===2)qs=shuffle(QUESTIONS);
|
|
87
|
+
else if(mode===3){
|
|
88
|
+
console.log('');CATEGORIES.forEach((cat,i)=>console.log(` [${i+1}] ${cat.icon} ${cat.name}`));
|
|
89
|
+
const ci=(parseInt(await ask(rl,`\n ${c.bold}Category [1-6]: ${c.reset}`))||1)-1;
|
|
90
|
+
qs=shuffle(QUESTIONS.filter(q=>q.category===ci));
|
|
91
|
+
}else if(mode===4)qs=shuffle(QUESTIONS).slice(0,15);
|
|
92
|
+
else qs=shuffle(QUESTIONS).slice(0,10);
|
|
93
|
+
|
|
94
|
+
if(!qs.length){console.log(' No questions!');rl.close();return;}
|
|
95
|
+
|
|
96
|
+
let correct=0;const labels=['A','B','C','D'];
|
|
97
|
+
for(let i=0;i<qs.length;i++){
|
|
98
|
+
const q=qs[i];const cat=CATEGORIES[q.category];
|
|
99
|
+
const stars=q.difficulty===1?'β
ββ':q.difficulty===2?'β
β
β':'β
β
β
';
|
|
100
|
+
const dc=q.difficulty===1?c.green:q.difficulty===2?c.yellow:c.red;
|
|
101
|
+
console.log(`\n${c.dim}${'β'.repeat(60)}${c.reset}`);
|
|
102
|
+
console.log(` ${c.bold}Q${i+1}/${qs.length}${c.reset} | ${cat.icon} ${cat.name} | ${dc}${stars}${c.reset}`);
|
|
103
|
+
console.log(`\n ${c.bold}${q.question}${c.reset}\n`);
|
|
104
|
+
q.options.forEach((o,j)=>console.log(` ${c.cyan}${labels[j]}${c.reset}) ${o}`));
|
|
105
|
+
let ans;
|
|
106
|
+
if(mode===4){
|
|
107
|
+
console.log(`\n ${c.yellow}β± 15 seconds!${c.reset}`);
|
|
108
|
+
ans=await Promise.race([ask(rl,`\n ${c.bold}Answer [A-D]: ${c.reset}`),new Promise(r=>setTimeout(()=>r(''),15000))]);
|
|
109
|
+
}else ans=await ask(rl,`\n ${c.bold}Answer [A-D]: ${c.reset}`);
|
|
110
|
+
const ai=labels.indexOf(ans.toUpperCase());
|
|
111
|
+
if(ai===q.answer){correct++;console.log(` ${c.bgGreen}${c.white}${c.bold} β CORRECT ${c.reset}`);}
|
|
112
|
+
else console.log(` ${c.bgRed}${c.white}${c.bold} β WRONG ${c.reset} Answer: ${labels[q.answer]}) ${q.options[q.answer]}`);
|
|
113
|
+
console.log(` ${c.dim}π‘ ${q.explanation}${c.reset}`);
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
const pct=Math.round(correct/qs.length*100);const sc=pct>=80?c.green:pct>=60?c.yellow:c.red;
|
|
117
|
+
console.log(`\n${c.bold}${c.cyan} βββββββββββ RESULTS βββββββββββ${c.reset}`);
|
|
118
|
+
console.log(`\n Score: ${sc}${c.bold}${correct}/${qs.length} (${pct}%)${c.reset}\n`);
|
|
119
|
+
const books=pct>=80?BOOKS.high:pct>=60?BOOKS.mid:BOOKS.low;
|
|
120
|
+
console.log(` ${c.bold}Recommended:${c.reset}`);
|
|
121
|
+
books.forEach(b=>console.log(` π ${b.title}\n ${c.cyan}${b.url}${c.reset}`));
|
|
122
|
+
console.log(`\n π 210+ eBooks: ${c.cyan}https://dargslan.com/books${c.reset}`);
|
|
123
|
+
console.log(` π Cheat Sheets: ${c.cyan}https://dargslan.com/cheat-sheets${c.reset}`);
|
|
124
|
+
console.log(`\n${c.dim} Made with β€ by Dargslan β dargslan.com${c.reset}\n`);
|
|
125
|
+
rl.close();
|
|
126
|
+
}
|
|
127
|
+
main().catch(console.error);
|
package/package.json
ADDED
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "dargslan-security-quiz",
|
|
3
|
+
"version": "1.0.0",
|
|
4
|
+
"description": "Interactive Cybersecurity quiz in your terminal. 40+ questions on penetration testing, forensics, compliance, incident response, encryption, and more.",
|
|
5
|
+
"main": "index.js",
|
|
6
|
+
"bin": {
|
|
7
|
+
"dargslan-security-quiz": "./index.js",
|
|
8
|
+
"security-quiz": "./index.js"
|
|
9
|
+
},
|
|
10
|
+
"keywords": [
|
|
11
|
+
"cybersecurity", "security", "quiz", "terminal", "cli", "pentest",
|
|
12
|
+
"penetration-testing", "forensics", "incident-response", "encryption",
|
|
13
|
+
"compliance", "oscp", "comptia", "security-plus", "ethical-hacking",
|
|
14
|
+
"learning", "certification", "practice"
|
|
15
|
+
],
|
|
16
|
+
"author": "Dargslan <info@dargslan.com> (https://dargslan.com)",
|
|
17
|
+
"license": "MIT",
|
|
18
|
+
"homepage": "https://dargslan.com",
|
|
19
|
+
"repository": { "type": "git", "url": "https://github.com/Dargslan/dargslan-security-quiz" },
|
|
20
|
+
"engines": { "node": ">=14.0.0" },
|
|
21
|
+
"files": ["index.js", "README.md", "LICENSE"]
|
|
22
|
+
}
|