positive-security / send-myLinks
Upload arbitrary data via Apple's Find My network.
☆1,854Updated last year
Alternatives and similar repositories for send-my
Users that are interested in send-my are comparing it to the libraries listed below
Sorting:
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,196Updated 3 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.☆829Updated 4 years ago
- An open Apple Wireless Direct Link (AWDL) implementation written in C☆1,376Updated last year
- Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.☆11,914Updated last year
- Apple Continuity Protocol Reverse Engineering and Dissector☆567Updated 6 months ago
- Apple BLE research☆2,157Updated last year
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,536Updated 4 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]☆1,068Updated 3 years ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,120Updated this week
- Query Apple's Find My network☆565Updated 8 months ago
- An open Apple AirDrop implementation written in Python☆9,141Updated last year
- firmware for nRF51 chips that is coincidentally compatible with the FindMy (AirTag) ecosystem☆444Updated last year
- Preimage attack against NeuralHash 💣☆672Updated 2 years ago
- iPhone 11 emulated on QEMU☆2,156Updated 2 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated 2 years ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,567Updated 4 years ago
- Off The Grid Messenger☆518Updated 4 years ago
- Create your own AirTag with OpenHaystack, but without the need to own an Apple device☆1,031Updated last month
- Mac Serial Generator - Generate complete sets of Serial Numbers for OSX-KVM, Docker-OSX and of course, OpenCore.☆1,653Updated 5 months ago
- Execute a local command using the processing power of another Linux machine.☆3,136Updated 2 years ago
- Linux kernel source tree☆871Updated 4 years ago
- ☆1,274Updated 4 months ago
- ☆1,439Updated 3 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,709Updated 3 years ago
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago
- ☆1,013Updated 2 years ago
- iOS gamed exploit (fixed in 15.0.2)☆438Updated 3 years ago
- A free video streaming service that runs on a ESP32☆1,001Updated 5 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- A GNU/Linux monitoring and profiling tool focused on single processes.☆675Updated 3 years ago