
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
nodes-http-loader
Advanced tools
A zero-dependency package to download, decrypt, and run programs from URLs using XOR encryption. The package also contains a prepare command to encrypt local binaries for secure distribution. This allows you to ensure your program is compatible with the l
A zero-dependency Node.js package to download, decrypt, and run programs from URLs using XOR encryption.
--debug flagInstall the package globally or locally using npm:
npm install -g nodes-http-loader
or
npm install nodes-http-loader
Download and run a program directly:
nodes-http-loader https://example.com/program mysecretkey
Prepare a local binary:
nodes-http-loader prepare ./myapp mysecretkey
# Upload prepared.bin to your server
nodes-http-loader https://yourserver.com/prepared.bin mysecretkey
Run with arguments:
nodes-http-loader https://example.com/program mysecretkey arg1 arg2
To download a program from a URL, decrypt it, and run it directly, use the following command:
If you installed globally (-g flag) you do not need to use 'npx' in front.
npx nodes-http-loader <url> <key> [args...]
npx nodes-http-loader --debug <url> <key> [args...] # With debug output
or if you installed globally (-g flag) you do not need to use 'npx' in front.
nodes-http-loader <url> <key> [args...]
nodes-http-loader --debug <url> <key> [args...] # With debug output
Examples:
nodes-http-loader https://github.com/user/repo/releases/download/v1.0.0/app mysecretkey
nodes-http-loader https://example.com/program mykey
nodes-http-loader https://example.com/program mykey arg1 arg2 "argument with spaces"
nodes-http-loader --debug https://example.com/program mykey # Show debug output
This command downloads the program from the URL, decrypts it, and runs it directly without creating any intermediate files.
Note: All downloaded files are expected to be encrypted. Use the prepare command to encrypt local binaries before uploading them.
To prepare a local binary file for HTTP distribution, use the prepare command:
nodes-http-loader prepare <binary> <key> [output]
Examples:
nodes-http-loader prepare ./myapp mysecretkey
nodes-http-loader prepare ./myapp mysecretkey encrypted-app.bin
This command encrypts your local binary file and creates an encrypted version that you can upload to your web server. The output file is ready for HTTP distribution.
Workflow:
nodes-http-loader prepare ./myapp mysecretkeyprepared.bin to your web servernodes-http-loader https://yourserver.com/prepared.bin mysecretkeyThe program is downloaded, decrypted, and executed directly without creating any intermediate files. You can pass arguments to the downloaded program:
nodes-http-loader https://example.com/program mysecretkey arg1 arg2
The execution is completely self-contained and requires only Node.js to run.
"spawn ENOEXEC" Error:
prepare commandFile Not Found:
Permission Denied:
Network Issues:
# Create a test file
echo '#!/bin/bash\necho "Hello World!"' > test.sh
chmod +x test.sh
# Prepare it
nodes-http-loader prepare test.sh mykey
# Test locally (upload prepared.bin to a server first)
nodes-http-loader https://yourserver.com/prepared.bin mykey
This project is licensed under the MIT License - see the LICENSE file for details.
LNodesL
FAQs
A zero-dependency package to download, decrypt, and run programs from URLs using XOR encryption. The package also contains a prepare command to encrypt local binaries for secure distribution. This allows you to ensure your program is compatible with the l
We found that nodes-http-loader demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.