Convert a binary file to a PNG image and then back to binary.
☆15Oct 30, 2013Updated 12 years ago
Alternatives and similar repositories for Bin2PNG
Users that are interested in Bin2PNG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C#/Rust/Python style formatting in C++.☆11Oct 23, 2018Updated 7 years ago
- ☆13Oct 12, 2023Updated 2 years ago
- Python extension for the GNU project debugger (GDB)☆13Mar 6, 2020Updated 6 years ago
- Apply hot patches for running processes without restarting☆13Jun 1, 2020Updated 5 years ago
- OSED course preparation materials.☆15May 27, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- Transformation and Registration Toolkit☆14Sep 12, 2019Updated 6 years ago
- Convert low ghidra pcode to verifiable C☆24Sep 13, 2024Updated last year
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Mobile application for Gophie☆12Jan 5, 2023Updated 3 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated 3 weeks ago
- ☆10May 6, 2023Updated 2 years ago
- GUI for regripper☆11Mar 19, 2019Updated 7 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Frontend for Uplink☆12Apr 22, 2025Updated 11 months ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Open source incident management and response platform.☆14Mar 16, 2018Updated 8 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated 2 years ago
- Materials for the "Principles of Static Program Analysis" course☆11Jul 17, 2025Updated 9 months ago
- Yet Another (LLM) Web UI, made with Gemini☆12Dec 25, 2024Updated last year
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- Development repository for the snort cookbook☆27Mar 2, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- The pattern matching swiss knife☆16Oct 28, 2019Updated 6 years ago
- ☆17Apr 10, 2026Updated last week
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆13Jul 13, 2018Updated 7 years ago
- MemoryCleaner (A.K.A. MemCleaner) is a simple and very lightweight program to keep RAM memory clean in Windows machines.☆10Feb 22, 2022Updated 4 years ago
- Presentations for C++ Summit (China) 2023☆17Dec 17, 2023Updated 2 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- ☆12Jan 17, 2026Updated 3 months ago
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Ipython notebook that explains diagonalization of ciculant / Toeplitz matrices☆15Jul 21, 2016Updated 9 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 4 months ago
- ☆12Feb 15, 2024Updated 2 years ago