From 5fe0566d49a9be97ea8ab30d541a2aa05c821481 Mon Sep 17 00:00:00 2001 From: 0x44F <89411010+0x44F@users.noreply.github.com> Date: Mon, 5 Sep 2022 00:17:44 +1200 Subject: [PATCH] Show alert box triggered by exploit --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index a7e4b9e..59484ba 100644 --- a/README.md +++ b/README.md @@ -14,6 +14,8 @@ The program takes in a number of factors (Red, Green, Blue pixels) and modifies > Public: 29/8/2022 > ``` +![image](https://user-images.githubusercontent.com/89411010/188312993-16c14847-c2aa-4c4f-b463-de13cd70a212.png) + ### But what is the vulnerability? The vulnerability is the fact that when you send an image over Discord inside of a channel, it checks for explicit imagery. By using the method described below, you can create an image 50% of the time that will trigger their explicit filters but not stop you from sending it. It is called 'silent detection' and has been used in the past to catch child predators.