Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
char-code-at
Advanced tools
A simple npm package to get the ASCII character codes of any string.
npm install char-code-at
char-code-at can be used as a CLI tool. Most simply:
λ char-code-at Hi
CHAR: "H" CHAR CODE: 72
CHAR: "i" CHAR CODE: 105
You can also pass in whitespace:
λ char-code-at "Hi, world"
CHAR: "H" CHAR CODE: 72
CHAR: "i" CHAR CODE: 105
CHAR: "," CHAR CODE: 44
CHAR: " " CHAR CODE: 32
CHAR: "w" CHAR CODE: 119
CHAR: "o" CHAR CODE: 111
CHAR: "r" CHAR CODE: 114
CHAR: "l" CHAR CODE: 108
CHAR: "d" CHAR CODE: 100
The --start
or -s
flag indicates the first index that will be analyzed:
λ char-code-at Hello -s 2
CHAR: "l" CHAR CODE: 108
CHAR: "l" CHAR CODE: 108
CHAR: "o" CHAR CODE: 111
Conversely, the --end
or -e
flag indicates the last index that will be analyzed:
λ char-code-at Hello -e 2
CHAR: "H" CHAR CODE: 72
CHAR: "e" CHAR CODE: 101
CHAR: "l" CHAR CODE: 108
Use both flags together to narrow your results even further:
λ char-code-at "Hi, world" -s 4 -e 5
CHAR: "w" CHAR CODE: 119
CHAR: "o" CHAR CODE: 111
Access char-code-at functionality from your JavaScript or TypeScript code. To start, require the package:
const charCodeAt = require('../char-code-at');
Then, in your code pass in 1. The string to analyze, 2. The first index to analyze, and 3. The last index to analyze.
charCodeAt.printCharCodes("Hi, world", 4, 5);
FAQs
Get the char codes for any string passed in.
The npm package char-code-at receives a total of 3 weekly downloads. As such, char-code-at popularity was classified as not popular.
We found that char-code-at demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.