Hermetically sealed versions of node and pnpm
☆18Jan 22, 2026Updated 2 months ago
Alternatives and similar repositories for hnvm
Users that are interested in hnvm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple, easy to use, powerful form state manage tools.☆12Sep 7, 2024Updated last year
- A proof of concept for using React + Grommet in a micro frontend architecture.☆12Nov 3, 2021Updated 4 years ago
- Rules for detecting security issues in Angular 1.x☆30Apr 20, 2023Updated 2 years ago
- Returns true if a filepath is absolute. The original path-is-absolute.☆22Jul 13, 2017Updated 8 years ago
- A dockerized Meteor deployment.☆13Nov 10, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆20Nov 4, 2023Updated 2 years ago
- OpenSource's freeFile. Freely share your file on any computer system. 在任何操作系统, 复杂网络情况下, 快速共享你的文件☆16May 6, 2021Updated 4 years ago
- Read the version of the App from config.xml and make it available in js☆11Sep 18, 2019Updated 6 years ago
- A simple Elixir DSL for creating GenServers☆57Mar 15, 2014Updated 12 years ago
- An open source plagiarism detector built in node.☆21Apr 3, 2024Updated last year
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- 🎵 Listen Spotify® on your Toniebox.☆33Dec 15, 2025Updated 3 months ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆13Apr 30, 2020Updated 5 years ago
- ☆14Feb 12, 2026Updated last month
- Collection of Helm charts that developed by the BeeInventor.☆10Feb 20, 2025Updated last year
- toy-bundler☆12Mar 27, 2023Updated 3 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- Generates a JSX string representation of React elements☆28Apr 11, 2017Updated 8 years ago
- Mouse and keyboard remote control for X11 systems implemented as a HTML5 web app for touchscreen devices.☆11May 23, 2023Updated 2 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆39Sep 11, 2017Updated 8 years ago
- Renames fonts to their internal name and unpacks .ttc/.otc files.☆12Updated this week
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- ☆11Feb 12, 2023Updated 3 years ago
- All Rudder public plugins in one repository. Licenses are by-plugin.☆16Mar 19, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- Sends public ip through e-mail. Command-line standalone.☆12Sep 22, 2017Updated 8 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Role Based Access Control for eggjs☆31Sep 25, 2018Updated 7 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆13Feb 12, 2024Updated 2 years ago
- Download your fonts from Fontastic with Gulp☆11Jan 17, 2019Updated 7 years ago