
Product
Rust Support Now in Beta
Socket's Rust support is moving to Beta: all users can scan Cargo projects and generate SBOMs, including Cargo.toml-only crates, with Rust-aware supply chain checks.
node-ncore-parser
Advanced tools
!! Currenty in beta mode !!
This module provides Node.js functions to list and download torrents from ncore.pro
const { login, getTorrents, downloadTorrent } = require('node-ncore-parser');
// Get "sessionId", which is required to further communications.
const sessionId = await login({ username: 'username', password: 'password' });
// Lists newest 25 torrents without filtering and get "key" to download torrents.
await getTorrents(sessionId);
// Lists filtered torrents (maximum 25)
const { key, torrents } = await getTorrents(sessionId, {
sortBy: 'seeders', //sorts by seeders
order: 'DESC', //desc
type: 'game_iso', //types are not checked yet, you should check how to use them at ncore.pro
page: 1, //for pagination
searchText: 'gta', //searches for gta
});
await downloadTorrent(sessionId, { key, torrentId: torrents[0].id }, '/home/me/downloads' );
FAQs
A parser, wrapper for using ncore.pro from server side
We found that node-ncore-parser demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket's Rust support is moving to Beta: all users can scan Cargo projects and generate SBOMs, including Cargo.toml-only crates, with Rust-aware supply chain checks.
Product
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
Security News
Socket CEO Feross Aboukhadijeh joins Risky Business Weekly to unpack recent npm phishing attacks, their limited impact, and the risks if attackers get smarter.