positive-security / send-myLinks
Upload arbitrary data via Apple's Find My network.
☆1,866Updated 2 years ago
Alternatives and similar repositories for send-my
Users that are interested in send-my are comparing it to the libraries listed below
Sorting:
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,217Updated 3 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.☆832Updated 4 years ago
- Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.☆12,451Updated last year
- An open Apple Wireless Direct Link (AWDL) implementation written in C☆1,429Updated last year
- An open letter against Apple's new privacy-invasive client-side content scanning.☆627Updated 2 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,535Updated 4 years ago
- Apple BLE research☆2,166Updated 2 years ago
- firmware for nRF51 chips that is coincidentally compatible with the FindMy (AirTag) ecosystem☆454Updated 2 years ago
- Preimage attack against NeuralHash 💣☆672Updated 3 months ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,576Updated 4 years ago
- ☆1,021Updated 3 years ago
- An open Apple AirDrop implementation written in Python☆9,424Updated last year
- Query Apple's Find My network☆651Updated last year
- ☆1,283Updated 8 months ago
- Linux kernel source tree☆870Updated 4 years ago
- Off The Grid Messenger☆521Updated 4 years ago
- macOS VM for Apple Silicon using Virtualization API☆1,361Updated 3 years ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,157Updated last year
- Track your Apple devices and look up their past location, battery levels, and more☆421Updated last year
- Turn a Raspberry Pi into an Airplay server using RPiPlay to enable screen mirroring on tvs, monitors and projectors.☆1,421Updated 3 years ago
- Execute a local command using the processing power of another Linux machine.☆3,136Updated 2 years ago
- A framework for constructing self-spreading binaries☆1,021Updated 2 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,588Updated 3 weeks ago
- Sample code for Virtualization framework☆760Updated 5 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell☆1,705Updated 4 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,372Updated 2 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,955Updated 2 years ago
- A GUI, easy to use WiFi network jammer for Mac OS X☆436Updated 5 years ago
- Using your Apple device as an access card in unsupported systems☆442Updated 11 months ago
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago