652 skills found · Page 1 of 22
guofei9987 / Blind WatermarkBlind&Invisible Watermark ,图片盲水印,提取水印无须原图!
javve / List.jsThe perfect library for adding search, sort, filters and flexibility to tables, lists and various HTML elements. Built to be invisible and work on existing HTML.
zeroclipboard / ZeroclipboardThe ZeroClipboard library provides an easy way to copy text to the clipboard using an invisible Adobe Flash movie and a JavaScript interface.
ringhyacinth / Star Office UIA pixel office for your OpenClaw: turn invisible work states into a cozy little space with characters, daily notes, and guest agents. Code under MIT; art assets for non-commercial learning only.
ibttf / Interview CoderAn invisible desktop application to help you pass your technical interviews.
KuroLabs / StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
simonbs / Runestone📝 Performant plain text editor for iOS with syntax highlighting, line numbers, invisible characters and much more.
thepersonalaicompany / AmurexWorld's first AI meeting copilot → The Invisible Companion for Work + Life
ShieldMnt / Invisible Watermarkpython library for invisible image watermark (blind image watermark)
alidcast / Rogue.jsThe "nearly invisible" way to server-render React applications
guofei9987 / Text Blind Watermark文本盲水印:把信息隐匿到文本中,put invisible blind watermark into a text.
zws-im / ZwsShorten URLs using invisible spaces
fire-keeper / BlindWatermark使用盲水印保护创作者的知识产权using invisible watermark to protect creator's intellectual property
syvaidya / OpenstegoOpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b) Watermarking: Watermarking image files with an invisible signature. It can be used to detect unauthorized file copying.
Prat011 / Free CluelyCluely - The invisible desktop assistant that provides real-time insights, answers, and support during meetings, interviews, presentations, and professional conversations.
nickboucher / Trojan SourceTrojan Source: Invisible Vulnerabilities
markets / Invisible Captcha🍯 Unobtrusive and flexible spam protection for Rails apps
lem0nSec / ShellGhostA memory-based evasion technique which makes shellcode invisible from process start to end.
umpox / Zero Width DetectionInvisibly inserting usernames into text with Zero-Width Characters
aweary / React Perimeter🚧 Create an invisible perimeter around an element and respond when its breached.