
Company News
/Security News
Socket Selected for OpenAI's Cybersecurity Grant Program
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.
Small command line tool for converting subtitles.
Subconv is a small command line tool for converting subtitles. It can convert subtitles between formats:
git clone git@github.com:wojtekw92/subconv.git
cd subconv
npm install -g
or simply
npm i subconv -g
subconv -i INPUTFILE.txt -c "OUTPUT FORMAT"
Options:
-h, --help output usage information
-V, --version output the version number
-c, --convert <format> convert input subtitles to output with selected format(TMP, MPL2, SubRip, MicroDVD)
-i, --input <file> input file
-o, --output <file> output file
-C, --check <file> Check subtitle format in file
-o, --output <outputFile> File with converted subtitles
-f, --fps [fps] Set FPS for some subtitles format[23.98]
if you don't give output file it will override input file
FAQs
Tool for converting subtitles. Supported formats TMP, MPL2, MicroDVD, SubRip.
The npm package subconv receives a total of 5 weekly downloads. As such, subconv popularity was classified as not popular.
We found that subconv demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Company News
/Security News
Socket is an initial recipient of OpenAI's Cybersecurity Grant Program, which commits $10M in API credits to defenders securing open source software.

Security News
Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, to discuss the recent surge in open source supply chain attacks.

Research
/Security News
Campaign of 108 extensions harvests identities, steals sessions, and adds backdoors to browsers, all tied to the same C2 infrastructure.