DavidBuchanan314 / tweetable-polyglot-pngLinks
Pack up to 3MB of data into a tweetable PNG polyglot file.
☆2,579Updated 4 years ago
Alternatives and similar repositories for tweetable-polyglot-png
Users that are interested in tweetable-polyglot-png are comparing it to the libraries listed below
Sorting:
- Upload arbitrary data via Apple's Find My network.☆1,868Updated 2 years ago
- RIAA: Please go die in a fire.☆611Updated 5 years ago
- ☆1,280Updated 8 months ago
- spy on the DNS queries your computer is making☆1,378Updated last year
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,062Updated 3 years ago
- Infinitely transfer between every device over pure HTTP with pipes or browsers☆3,121Updated last week
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,537Updated 4 years ago
- Reverse Engineer's Toolkit☆5,149Updated 8 months ago
- A framework for constructing self-spreading binaries☆1,021Updated 2 years ago
- `ls` alternative with useful info and a splash of color 🎨☆1,265Updated 4 years ago
- Design custom QR codes with this web app!☆446Updated 2 years ago
- Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily connect☆3,105Updated 3 years ago
- Simple command line tool for text to image generation using OpenAI's CLIP and Siren (Implicit neural representation network). Technique w…☆4,334Updated 3 years ago
- An open-source digital image forensic toolset☆3,083Updated 6 months ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆627Updated 2 years ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,122Updated 2 years ago
- This is not youtube-dl☆881Updated 5 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,592Updated last month
- 🔐 Share end-to-end encrypted secrets with others via a one-time URL☆1,841Updated 11 months ago
- 🗄 Mount your browser tabs as a filesystem.☆3,920Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,958Updated 3 years ago
- Execute a local command using the processing power of another Linux machine.☆3,136Updated 2 years ago
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing☆648Updated last year
- 🐧ping command but with pingu☆2,084Updated last year
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,882Updated 4 years ago
- 👨🏼⚖️ reddit bot that turns comment chains into ace attorney scenes☆773Updated 4 years ago
- ☆2,511Updated 3 years ago
- ☆2,079Updated 4 years ago
- Answering the question nobody asked: what if you wanted to text your friends using only ARP?☆2,540Updated 2 years ago
- A webcam-based 3x3x3 rubik's cube solver written in Python 3 and OpenCV.☆651Updated last month