This gist is updated daily via cron job and lists stats for npm packages:
- Top 1,000 most depended-upon packages
- Top 1,000 packages with largest number of dependencies
- Top 1,000 packages with highest PageRank score
/* | |
Copyright (c) 2003, Brian Alliet. All rights reserved. | |
Redistribution and use in source and binary forms, with or without | |
modification, are permitted provided that the following conditions are met: | |
1. Redistributions of source code must retain the above copyright notice, | |
this list of conditions and the following disclaimer. | |
2. Redistributions in binary form must reproduce the above copyright notice, |
#import <Foundation/Foundation.h> | |
#import <objc/runtime.h> | |
#import "typestring.h" | |
// clang -g -fobjc-arc -Wall -framework Foundation -o runtime typestring.m runtime.m | |
// Runtime reference, at least until Apple breaks the link | |
// http://developer.apple.com/library/ios/#documentation/Cocoa/Reference/ObjCRuntimeRef/Reference/reference.html |
Existing AE work focused on Restricted Models: | |
Sean Heelan’s “Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities” | |
David Brumley (@ Carnegie Mellon) et al. (AEG, MAYHEM, etc) | |
Most whitepapers on Cyber Grand Challenge! (CGC) | |
[Good Course Material] | |
https://www.cs.umd.edu/class/spring2013/cmsc631/lectures/symbolic-exec.pdf | |
https://www.utdallas.edu/~zxl111930/spring2012/public/lec4.pdf | |
http://web.mit.edu/16.399/www/lecture_01-intro/Cousot_MIT_2005_Course_01_4-1.pdf | |
http://homepage.cs.uiowa.edu/~tinelli/classes/seminar/Cousot.pdf |
-- licensed with CC BY-NC-SA 4.0 https://creativecommons.org/licenses/by-nc-sa/4.0/ | |
-- Carl Testa | |
--2021-11-16 | |
stack [ | |
slow 4 $ note "0 -2 ~ ~" # s "flbass" # speed 0.8 # gain 0.8, | |
off 0.25 (+ speed "<0.5 1 2 4>") $ s "glitch*16?" # n (irand 9) # pan perlin # speed (range "<0.6 0.8>" "<1 1.2>" square), | |
slow 1 $ s "[drum*4, [~ hh]*4]", | |
slow 4 $ degradeBy 0.5 $ ply 4 $ scramble 6 $ note (scale "minor" ("7 6 5 2 1 0" + "<0 -2 -2 -2>")) # speed 0.8 # s "gtr" | |
] |
// @ts-check | |
const fs = require("fs"); | |
const http = require("http"); | |
const esbuild = require("esbuild"); | |
const { join } = require("path"); | |
// ===== Configuration ===== | |
const port = parseInt(process.argv[process.argv.indexOf("--port") + 1]) || 8080; |
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)