jweyrich / imgifyLinks
πΌ imgify - Convert any file to PNG and back.
β13Updated 3 months ago
Alternatives and similar repositories for imgify
Users that are interested in imgify are comparing it to the libraries listed below
Sorting:
- #οΈβ£ πΈοΈ π€ HTTP Headers Hashingβ13Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)β12Updated 4 years ago
- Carving tool based in Radare2 & Yaraβ17Updated 7 years ago
- python3 scripts to help with aws triage needsβ15Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashingβ20Updated 5 years ago
- Network Traffic Fuzzerβ17Updated last year
- Shell utility to list colorfully show what processes are listening on what ports.β19Updated 6 years ago
- Standardizing Security Titlesβ13Updated 3 weeks ago
- The Multiplatform Linux Sandboxβ16Updated 2 years ago
- A Canary which fires when uninstalledβ34Updated 4 years ago
- β15Updated 4 years ago
- RACF Database Parserβ11Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Passβ¦β18Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosureβ40Updated 11 months ago
- A Python client for the Global CVE Allocation System.β14Updated last week
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.β32Updated last year
- Decryption utility for PGP Whole Disk Encryptionβ20Updated 4 years ago
- Golang Shlyuz Implant Implementationβ13Updated 8 months ago
- Docker projects to retain beacon source IPs using C2 relaying infraβ11Updated 6 years ago
- β13Updated 5 years ago
- β22Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Trainingβ30Updated 2 months ago
- Ansible scripts to build an attack boxβ24Updated 7 years ago
- Linux and Windows Hardening Pointsβ12Updated 7 years ago
- egrets monitors egressβ46Updated 5 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 4 years ago
- β16Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated last year
- Catalog Red Team techniques that cause popups in various macOS versionsβ15Updated last year
- Tricard - Malware Sandbox Fingerprintingβ23Updated 2 years ago