Research
Security News
Threat Actor Exposes Playbook for Exploiting npm to Build Blockchain-Powered Botnets
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Simple CRC checksum functions for JavaScript(CRC-16 and CRC-32).
You can also install js-crc by using Bower.
bower install js-crc
For node.js, you can use this command to install:
npm install js-crc
You could use like this:
crc32('Message to hash');
crc16('Message to hash');
If you use node.js, you should require the module first:
crc32 = require('js-crc').crc32;
crc16 = require('js-crc').crc16;
Code
crc32('The quick brown fox jumps over the lazy dog');
crc32('The quick brown fox jumps over the lazy dog.');
Output
414fa339
519025e9
It also supports byte Array
, Uint8Array
, ArrayBuffer
input:
Code
crc32([0]);
crc32(new Uint8Array([0]));
Output
d202ef8d
d202ef8d
The project is released under the MIT license.
The project's website is located at https://github.com/emn178/js-crc
Author: emn178@gmail.com
v0.1.0 / 2015-03-08
FAQs
Simple CRC checksum functions for JavaScript. Supports many predefined models such as CRC-8, CRC-16, CRC-24, CRC-32, and CRC-64. It also supports custom CRC models.
The npm package js-crc receives a total of 5,473 weekly downloads. As such, js-crc popularity was classified as popular.
We found that js-crc demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.
Security News
NVD’s backlog surpasses 20,000 CVEs as analysis slows and NIST announces new system updates to address ongoing delays.
Security News
Research
A malicious npm package disguised as a WhatsApp client is exploiting authentication flows with a remote kill switch to exfiltrate data and destroy files.