#downloader — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #downloader, aggregated by home.social.
-
Ani-Gui
https://codingotaku.com/projects/ani-gui-20260511144955
A modern, accessible GUI anime streaming client for Linux built with Rust and egui. Based on the popular ani-cli but with a native desktop interface.
-
One Open-source Project Daily
Lightweight CLI download accelerator
https://github.com/axel-download-accelerator/axel
#1ospd #opensource #accelerate #downloader #hacktoberfest #light #lightweight -
One Open-source Project Daily
Lightweight CLI download accelerator
https://github.com/axel-download-accelerator/axel
#1ospd #opensource #accelerate #downloader #hacktoberfest #light #lightweight -
One Open-source Project Daily
Lightweight CLI download accelerator
https://github.com/axel-download-accelerator/axel
#1ospd #opensource #accelerate #downloader #hacktoberfest #light #lightweight -
One Open-source Project Daily
Lightweight CLI download accelerator
https://github.com/axel-download-accelerator/axel
#1ospd #opensource #accelerate #downloader #hacktoberfest #light #lightweight -
One Open-source Project Daily
Lightweight CLI download accelerator
https://github.com/axel-download-accelerator/axel
#1ospd #opensource #accelerate #downloader #hacktoberfest #light #lightweight -
One Open-source Project Daily
Very customizable imageboard/booru downloader with powerful filenaming features.
https://github.com/Bionus/imgbrd-grabber
#1ospd #opensource #android #booru #danbooru #downloader #gelbooru #grabber #imageboard #linux #macos #windows -
One Open-source Project Daily
Very customizable imageboard/booru downloader with powerful filenaming features.
https://github.com/Bionus/imgbrd-grabber
#1ospd #opensource #android #booru #danbooru #downloader #gelbooru #grabber #imageboard #linux #macos #windows -
One Open-source Project Daily
Very customizable imageboard/booru downloader with powerful filenaming features.
https://github.com/Bionus/imgbrd-grabber
#1ospd #opensource #android #booru #danbooru #downloader #gelbooru #grabber #imageboard #linux #macos #windows -
One Open-source Project Daily
Very customizable imageboard/booru downloader with powerful filenaming features.
https://github.com/Bionus/imgbrd-grabber
#1ospd #opensource #android #booru #danbooru #downloader #gelbooru #grabber #imageboard #linux #macos #windows -
One Open-source Project Daily
Very customizable imageboard/booru downloader with powerful filenaming features.
https://github.com/Bionus/imgbrd-grabber
#1ospd #opensource #android #booru #danbooru #downloader #gelbooru #grabber #imageboard #linux #macos #windows -
💬 Telegram plays an important role in many underground businesses. Threat actors commonly stand up channels to market and support malicious activities such as malware-as-a-service (MaaS) subscriptions. While investigating ScreenConnect servers, a remote access support tool commonly abused by threat actors, we found an interesting business that we had never seen before. This actor used telegram as a storefront and support channel for an underground Remote Access Toolkit Online (RATO) platform. Technically RATO is a service that bundles cPanel and ScreenConnect technology to help its cyber criminal customers remotely access victim machines and manage scams, phishing, and malware (e.g. Latrodectus).
🐀 🔴 We discovered several servers that matched a ScreenConnect signature but these instances did not serve the typical ScreenConnect web content. Instead, their service is called "RATO PLATFORM" and the portal page shows the slogan "Can't catch the RAT__". We've found several telegram channels that promote services named "RATO", use the rat head logo (see attached image), or the domain rato[.]to. Based on their telegram chat content, it's clear their business model is focused on enabling cybercrime.
@rato_support
@ratofaqs
@rato_backup
@rato_hosting
@Rato2_botConsistent with RATO’s “BulletProof & Anti-Red Hosting” feature, we saw many RATO instances on ASNs with a high concentration of malicious activity (e.g., AS202412). Additionally, RATO infrastructure shows strong ties to Indonesia including Indonesian IP addresses in passive DNS and domains within the same cloudflare account used for serving online gambling to Indonesian-speaking users. Collectively, RATO and its customers operate a large number of domains. Here are some examples:
asakusubinitohas[.]com
bmw320ikaka[.]co
cpusx[.]com
newoneazu[.]com
ratmail[.]pro
rato[.]page
rato[.]to
ratodemo[.]pro
sesrecipt[.]com
silk-gen[.]com
sunostart[.]com
viewyourstatementonline[.]com#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #phishing #malware #maas #telegram #indonesia #screenconnect #latrodectus #rat #rmm #remotemonitoringmanagement #downloader #spam #rato
-
💬 Telegram plays an important role in many underground businesses. Threat actors commonly stand up channels to market and support malicious activities such as malware-as-a-service (MaaS) subscriptions. While investigating ScreenConnect servers, a remote access support tool commonly abused by threat actors, we found an interesting business that we had never seen before. This actor used telegram as a storefront and support channel for an underground Remote Access Toolkit Online (RATO) platform. Technically RATO is a service that bundles cPanel and ScreenConnect technology to help its cyber criminal customers remotely access victim machines and manage scams, phishing, and malware (e.g. Latrodectus).
🐀 🔴 We discovered several servers that matched a ScreenConnect signature but these instances did not serve the typical ScreenConnect web content. Instead, their service is called "RATO PLATFORM" and the portal page shows the slogan "Can't catch the RAT__". We've found several telegram channels that promote services named "RATO", use the rat head logo (see attached image), or the domain rato[.]to. Based on their telegram chat content, it's clear their business model is focused on enabling cybercrime.
@rato_support
@ratofaqs
@rato_backup
@rato_hosting
@Rato2_botConsistent with RATO’s “BulletProof & Anti-Red Hosting” feature, we saw many RATO instances on ASNs with a high concentration of malicious activity (e.g., AS202412). Additionally, RATO infrastructure shows strong ties to Indonesia including Indonesian IP addresses in passive DNS and domains within the same cloudflare account used for serving online gambling to Indonesian-speaking users. Collectively, RATO and its customers operate a large number of domains. Here are some examples:
asakusubinitohas[.]com
bmw320ikaka[.]co
cpusx[.]com
newoneazu[.]com
ratmail[.]pro
rato[.]page
rato[.]to
ratodemo[.]pro
sesrecipt[.]com
silk-gen[.]com
sunostart[.]com
viewyourstatementonline[.]com#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #phishing #malware #maas #telegram #indonesia #screenconnect #latrodectus #rat #rmm #remotemonitoringmanagement #downloader #spam #rato
-
💬 Telegram plays an important role in many underground businesses. Threat actors commonly stand up channels to market and support malicious activities such as malware-as-a-service (MaaS) subscriptions. While investigating ScreenConnect servers, a remote access support tool commonly abused by threat actors, we found an interesting business that we had never seen before. This actor used telegram as a storefront and support channel for an underground Remote Access Toolkit Online (RATO) platform. Technically RATO is a service that bundles cPanel and ScreenConnect technology to help its cyber criminal customers remotely access victim machines and manage scams, phishing, and malware (e.g. Latrodectus).
🐀 🔴 We discovered several servers that matched a ScreenConnect signature but these instances did not serve the typical ScreenConnect web content. Instead, their service is called "RATO PLATFORM" and the portal page shows the slogan "Can't catch the RAT__". We've found several telegram channels that promote services named "RATO", use the rat head logo (see attached image), or the domain rato[.]to. Based on their telegram chat content, it's clear their business model is focused on enabling cybercrime.
@rato_support
@ratofaqs
@rato_backup
@rato_hosting
@Rato2_botConsistent with RATO’s “BulletProof & Anti-Red Hosting” feature, we saw many RATO instances on ASNs with a high concentration of malicious activity (e.g., AS202412). Additionally, RATO infrastructure shows strong ties to Indonesia including Indonesian IP addresses in passive DNS and domains within the same cloudflare account used for serving online gambling to Indonesian-speaking users. Collectively, RATO and its customers operate a large number of domains. Here are some examples:
asakusubinitohas[.]com
bmw320ikaka[.]co
cpusx[.]com
newoneazu[.]com
ratmail[.]pro
rato[.]page
rato[.]to
ratodemo[.]pro
sesrecipt[.]com
silk-gen[.]com
sunostart[.]com
viewyourstatementonline[.]com#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #phishing #malware #maas #telegram #indonesia #screenconnect #latrodectus #rat #rmm #remotemonitoringmanagement #downloader #spam #rato
-
💬 Telegram plays an important role in many underground businesses. Threat actors commonly stand up channels to market and support malicious activities such as malware-as-a-service (MaaS) subscriptions. While investigating ScreenConnect servers, a remote access support tool commonly abused by threat actors, we found an interesting business that we had never seen before. This actor used telegram as a storefront and support channel for an underground Remote Access Toolkit Online (RATO) platform. Technically RATO is a service that bundles cPanel and ScreenConnect technology to help its cyber criminal customers remotely access victim machines and manage scams, phishing, and malware (e.g. Latrodectus).
🐀 🔴 We discovered several servers that matched a ScreenConnect signature but these instances did not serve the typical ScreenConnect web content. Instead, their service is called "RATO PLATFORM" and the portal page shows the slogan "Can't catch the RAT__". We've found several telegram channels that promote services named "RATO", use the rat head logo (see attached image), or the domain rato[.]to. Based on their telegram chat content, it's clear their business model is focused on enabling cybercrime.
@rato_support
@ratofaqs
@rato_backup
@rato_hosting
@Rato2_botConsistent with RATO’s “BulletProof & Anti-Red Hosting” feature, we saw many RATO instances on ASNs with a high concentration of malicious activity (e.g., AS202412). Additionally, RATO infrastructure shows strong ties to Indonesia including Indonesian IP addresses in passive DNS and domains within the same cloudflare account used for serving online gambling to Indonesian-speaking users. Collectively, RATO and its customers operate a large number of domains. Here are some examples:
asakusubinitohas[.]com
bmw320ikaka[.]co
cpusx[.]com
newoneazu[.]com
ratmail[.]pro
rato[.]page
rato[.]to
ratodemo[.]pro
sesrecipt[.]com
silk-gen[.]com
sunostart[.]com
viewyourstatementonline[.]com#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #phishing #malware #maas #telegram #indonesia #screenconnect #latrodectus #rat #rmm #remotemonitoringmanagement #downloader #spam #rato
-
💬 Telegram plays an important role in many underground businesses. Threat actors commonly stand up channels to market and support malicious activities such as malware-as-a-service (MaaS) subscriptions. While investigating ScreenConnect servers, a remote access support tool commonly abused by threat actors, we found an interesting business that we had never seen before. This actor used telegram as a storefront and support channel for an underground Remote Access Toolkit Online (RATO) platform. Technically RATO is a service that bundles cPanel and ScreenConnect technology to help its cyber criminal customers remotely access victim machines and manage scams, phishing, and malware (e.g. Latrodectus).
🐀 🔴 We discovered several servers that matched a ScreenConnect signature but these instances did not serve the typical ScreenConnect web content. Instead, their service is called "RATO PLATFORM" and the portal page shows the slogan "Can't catch the RAT__". We've found several telegram channels that promote services named "RATO", use the rat head logo (see attached image), or the domain rato[.]to. Based on their telegram chat content, it's clear their business model is focused on enabling cybercrime.
@rato_support
@ratofaqs
@rato_backup
@rato_hosting
@Rato2_botConsistent with RATO’s “BulletProof & Anti-Red Hosting” feature, we saw many RATO instances on ASNs with a high concentration of malicious activity (e.g., AS202412). Additionally, RATO infrastructure shows strong ties to Indonesia including Indonesian IP addresses in passive DNS and domains within the same cloudflare account used for serving online gambling to Indonesian-speaking users. Collectively, RATO and its customers operate a large number of domains. Here are some examples:
asakusubinitohas[.]com
bmw320ikaka[.]co
cpusx[.]com
newoneazu[.]com
ratmail[.]pro
rato[.]page
rato[.]to
ratodemo[.]pro
sesrecipt[.]com
silk-gen[.]com
sunostart[.]com
viewyourstatementonline[.]com#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #phishing #malware #maas #telegram #indonesia #screenconnect #latrodectus #rat #rmm #remotemonitoringmanagement #downloader #spam #rato
-
We planned one report on Keitaro abuse, but we ran out of pages before we ran out of cases.
So here’s Part 2 of 3, a medley of threats that go well beyond AI‑investment scams.Threat actors abuse Keitaro’s traffic distribution, cloaking, and rule engine to hide malicious landing pages behind geo and device-based filters. They stack bulletproof hosting and reverse proxies to add layers of indirection, making takedown and analysis harder. In this post, we share how we overcame this using multi‑protocol, multi‑vantage telemetry. We leveraged JA4+ web server fingerprints, DNS analytics, and Confiant’s visibility into advertising supply chain data to uncover Keitaro abuse and the delivery of malware downloaders, infostealers, weaponized RMMs, wallet drainer campaigns, scams, and email spam and advertising attack vectors.
If you hunt threats distributed via adtech, these indicators can be useful pivots. https://www.infoblox.com/blog/threat-intelligence/no-reach-no-risk-the-keitaro-abuse-in-modern-cybercrime-distribution/
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising #infostealer #rmm #remotemonitoringmanagement #downloader #malware #spam #airdrop #cryptocurrency #ja4 #ja4_fingerprinting
-
We planned one report on Keitaro abuse, but we ran out of pages before we ran out of cases.
So here’s Part 2 of 3, a medley of threats that go well beyond AI‑investment scams.Threat actors abuse Keitaro’s traffic distribution, cloaking, and rule engine to hide malicious landing pages behind geo and device-based filters. They stack bulletproof hosting and reverse proxies to add layers of indirection, making takedown and analysis harder. In this post, we share how we overcame this using multi‑protocol, multi‑vantage telemetry. We leveraged JA4+ web server fingerprints, DNS analytics, and Confiant’s visibility into advertising supply chain data to uncover Keitaro abuse and the delivery of malware downloaders, infostealers, weaponized RMMs, wallet drainer campaigns, scams, and email spam and advertising attack vectors.
If you hunt threats distributed via adtech, these indicators can be useful pivots. https://www.infoblox.com/blog/threat-intelligence/no-reach-no-risk-the-keitaro-abuse-in-modern-cybercrime-distribution/
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising #infostealer #rmm #remotemonitoringmanagement #downloader #malware #spam #airdrop #cryptocurrency #ja4 #ja4_fingerprinting
-
We planned one report on Keitaro abuse, but we ran out of pages before we ran out of cases.
So here’s Part 2 of 3, a medley of threats that go well beyond AI‑investment scams.Threat actors abuse Keitaro’s traffic distribution, cloaking, and rule engine to hide malicious landing pages behind geo and device-based filters. They stack bulletproof hosting and reverse proxies to add layers of indirection, making takedown and analysis harder. In this post, we share how we overcame this using multi‑protocol, multi‑vantage telemetry. We leveraged JA4+ web server fingerprints, DNS analytics, and Confiant’s visibility into advertising supply chain data to uncover Keitaro abuse and the delivery of malware downloaders, infostealers, weaponized RMMs, wallet drainer campaigns, scams, and email spam and advertising attack vectors.
If you hunt threats distributed via adtech, these indicators can be useful pivots. https://www.infoblox.com/blog/threat-intelligence/no-reach-no-risk-the-keitaro-abuse-in-modern-cybercrime-distribution/
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising #infostealer #rmm #remotemonitoringmanagement #downloader #malware #spam #airdrop #cryptocurrency #ja4 #ja4_fingerprinting
-
We planned one report on Keitaro abuse, but we ran out of pages before we ran out of cases.
So here’s Part 2 of 3, a medley of threats that go well beyond AI‑investment scams.Threat actors abuse Keitaro’s traffic distribution, cloaking, and rule engine to hide malicious landing pages behind geo and device-based filters. They stack bulletproof hosting and reverse proxies to add layers of indirection, making takedown and analysis harder. In this post, we share how we overcame this using multi‑protocol, multi‑vantage telemetry. We leveraged JA4+ web server fingerprints, DNS analytics, and Confiant’s visibility into advertising supply chain data to uncover Keitaro abuse and the delivery of malware downloaders, infostealers, weaponized RMMs, wallet drainer campaigns, scams, and email spam and advertising attack vectors.
If you hunt threats distributed via adtech, these indicators can be useful pivots. https://www.infoblox.com/blog/threat-intelligence/no-reach-no-risk-the-keitaro-abuse-in-modern-cybercrime-distribution/
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising #infostealer #rmm #remotemonitoringmanagement #downloader #malware #spam #airdrop #cryptocurrency #ja4 #ja4_fingerprinting
-
We planned one report on Keitaro abuse, but we ran out of pages before we ran out of cases.
So here’s Part 2 of 3, a medley of threats that go well beyond AI‑investment scams.Threat actors abuse Keitaro’s traffic distribution, cloaking, and rule engine to hide malicious landing pages behind geo and device-based filters. They stack bulletproof hosting and reverse proxies to add layers of indirection, making takedown and analysis harder. In this post, we share how we overcame this using multi‑protocol, multi‑vantage telemetry. We leveraged JA4+ web server fingerprints, DNS analytics, and Confiant’s visibility into advertising supply chain data to uncover Keitaro abuse and the delivery of malware downloaders, infostealers, weaponized RMMs, wallet drainer campaigns, scams, and email spam and advertising attack vectors.
If you hunt threats distributed via adtech, these indicators can be useful pivots. https://www.infoblox.com/blog/threat-intelligence/no-reach-no-risk-the-keitaro-abuse-in-modern-cybercrime-distribution/
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising #infostealer #rmm #remotemonitoringmanagement #downloader #malware #spam #airdrop #cryptocurrency #ja4 #ja4_fingerprinting
-
today I learned of shelf mark, a #book #downloader https://github.com/calibrain/shelfmark?tab=readme-ov-file#-shelfmark-book-downloader
-
today I learned of shelf mark, a #book #downloader https://github.com/calibrain/shelfmark?tab=readme-ov-file#-shelfmark-book-downloader
-
today I learned of shelf mark, a #book #downloader https://github.com/calibrain/shelfmark?tab=readme-ov-file#-shelfmark-book-downloader
-
today I learned of shelf mark, a #book #downloader https://github.com/calibrain/shelfmark?tab=readme-ov-file#-shelfmark-book-downloader
-
today I learned of shelf mark, a #book #downloader https://github.com/calibrain/shelfmark?tab=readme-ov-file#-shelfmark-book-downloader
-
🎉 أطلق GMD v1.92 - منزل وسائط جنو | GNU Media Downloader
النسخة 1.92 تقدم نسختين منفصلتين: طرفية (CLI) ورسومية (GUI) + حزم AppImage
📥 روابط التحميل المباشرة
الإصدارالرابطجميع الإصداراتصفحة الإصداراتGMD-GUI (رسومية)تحميل AppImageGMD-CLI (طرفية)تحميل AppImage🌐 روابط المشروع
- المستودع الرسمي: github.com/SalehGNUTUX/GMD
- صفحة الإصدارات: Releases Page
- موقع المطور: salehgnutux.github.io/gnutux/
📝 وصف الإصدار
GMD (GNU Media Downloader) هو أداة قوية لتحميل وتحويل الوسائط من الإنترنت، تدعم آلاف المواقع (YouTube, Vimeo, وغيرها).
الإصدار 1.92 يجلب:
- ✅ نسختان منفصلتان: CLI للمحترفين، GUI للمستخدمين العاديين
- ✅ حزم AppImage: شغّل فوراً بدون تثبيت
- ✅ قص الفيديو والصوت: من رابط مباشر أو ملف محلي
- ✅ معلومات الوسائط: عرض التفاصيل قبل التحميل
- ✅ دعم ثنائي اللغة: عربي وإنجليزي
🚀 للتشغيل الفوري
لتحميل وتشغيل النسخة الرسومية:
wget https://github.com/SalehGNUTUX/GMD/releases/download/GMD_1.92_Media_Downloader/GMD-GUI_GNU_Media_D... chmod +x GMD-GUI_GNU_Media_Downloader-x86_64.AppImage ./GMD-GUI_GNU_Media_Downloader-x86_64.AppImageلتحميل وتشغيل النسخة الطرفية:
wget https://github.com/SalehGNUTUX/GMD/releases/download/GMD_1.92_Media_Downloader/GMD_CLI_Media_Downl... chmod +x GMD_CLI_Media_Downloader-x86_64.AppImage ./GMD_CLI_Media_Downloader-x86_64.AppImageالإصدار 1.92 - نسختان: طرفية للمحترفين ورسومية للجميع! ✨
🎉 Announcing GMD v1.92 - GNU Media Downloader
Version 1.92 brings two separate editions: CLI & GUI + AppImage packages
📥 Direct Download Links
EditionLinkAll ReleasesReleases PageGMD-GUI (Graphical)Download AppImageGMD-CLI (Terminal)Download AppImage🌐 Project Links
- Official Repository: github.com/SalehGNUTUX/GMD
- Releases Page: Releases Page
- Developer Site: salehgnutux.github.io/gnutux/
📝 Release Description
GMD (GNU Media Downloader) is a powerful tool for downloading and converting media from the internet, supporting thousands of sites (YouTube, Vimeo, and more).
Version 1.92 brings:
- ✅ Two separate editions: CLI for pros, GUI for regular users
- ✅ AppImage packages: Run instantly without installation
- ✅ Trim video & audio: From direct URL or local file
- ✅ Media info: View details before downloading
- ✅ Bilingual support: Arabic and English
🚀 Quick Start
Download and run the GUI edition:
wget https://github.com/SalehGNUTUX/GMD/releases/download/GMD_1.92_Media_Downloader/GMD-GUI_GNU_Media_D... chmod +x GMD-GUI_GNU_Media_Downloader-x86_64.AppImage ./GMD-GUI_GNU_Media_Downloader-x86_64.AppImageDownload and run the CLI edition:
wget https://github.com/SalehGNUTUX/GMD/releases/download/GMD_1.92_Media_Downloader/GMD_CLI_Media_Downl... chmod +x GMD_CLI_Media_Downloader-x86_64.AppImage ./GMD_CLI_Media_Downloader-x86_64.AppImageVersion 1.92 - Two editions: CLI for pros, GUI for everyone! ✨
#gnutux #youtube #downloader #video #audio #foss #linux #terminal #appimage #لينكس #تنزيل #الوسائط #يوتيوب
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
“You come across an interesting video on social media and thought of downloading it so that you can send it to someone or modify it to share it on some other platform. You know, the meme videos? Not every platform allows downloading videos, and thus ...continues
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
“You come across an interesting video on social media and thought of downloading it so that you can send it to someone or modify it to share it on some other platform. You know, the meme videos? Not every platform allows downloading videos, and thus ...continues
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
“You come across an interesting video on social media and thought of downloading it so that you can send it to someone or modify it to share it on some other platform. You know, the meme videos? Not every platform allows downloading videos, and thus ...continues
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
“You come across an interesting video on social media and thought of downloading it so that you can send it to someone or modify it to share it on some other platform. You know, the meme videos? Not every platform allows downloading videos, and thus ...continues
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
“You come across an interesting video on social media and thought of downloading it so that you can send it to someone or modify it to share it on some other platform. You know, the meme videos? Not every platform allows downloading videos, and thus ...continues
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
https://squeet.me/display/962c3e10-0392aed2-c7f35451cb48e942
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
https://squeet.me/display/962c3e10-0392aed2-c7f35451cb48e942
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
https://squeet.me/display/962c3e10-0392aed2-c7f35451cb48e942
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
https://squeet.me/display/962c3e10-0392aed2-c7f35451cb48e942
-
This is Probably the Best Video Downloader App (And it is Free and Open Source)
https://squeet.me/display/962c3e10-0392aed2-c7f35451cb48e942
-
RE: https://furries.club/@helloyanis/115933351718311012
Well, it seems after 10k users the #Mozilla team does manual reviews for every new version of an add-on. I guess the releases for Media Downloader Unleashed are gonne take a little longer to roll out than before! Probably like a few weeks rather than a few minutes. But it should be fine. :blobCat_blush:
Next version : Download fom even more sites with, for example, the ability to copy authentication cookies that are sometimes required to access the media files! (When the site uses "credentials": " include" )It took a while to get working, as HTTP Only cookies are usually not accessible, but I found a way!
Get the (not yet updated) extension at https://addons.mozilla.org/addon/media-downloader-unleashed/ !
#technology #web #download #browserextension #browser #firefox #uptate #media #downloader #mediadownloaderunleashed
-
RE: https://furries.club/@helloyanis/115933351718311012
Well, it seems after 10k users the #Mozilla team does manual reviews for every new version of an add-on. I guess the releases for Media Downloader Unleashed are gonne take a little longer to roll out than before! Probably like a few weeks rather than a few minutes. But it should be fine. :blobCat_blush:
Next version : Download fom even more sites with, for example, the ability to copy authentication cookies that are sometimes required to access the media files! (When the site uses "credentials": " include" )It took a while to get working, as HTTP Only cookies are usually not accessible, but I found a way!
Get the (not yet updated) extension at https://addons.mozilla.org/addon/media-downloader-unleashed/ !
#technology #web #download #browserextension #browser #firefox #uptate #media #downloader #mediadownloaderunleashed
-
RE: https://furries.club/@helloyanis/115933351718311012
Well, it seems after 10k users the #Mozilla team does manual reviews for every new version of an add-on. I guess the releases for Media Downloader Unleashed are gonne take a little longer to roll out than before! Probably like a few weeks rather than a few minutes. But it should be fine. :blobCat_blush:
Next version : Download fom even more sites with, for example, the ability to copy authentication cookies that are sometimes required to access the media files! (When the site uses "credentials": " include" )It took a while to get working, as HTTP Only cookies are usually not accessible, but I found a way!
Get the (not yet updated) extension at https://addons.mozilla.org/addon/media-downloader-unleashed/ !
#technology #web #download #browserextension #browser #firefox #uptate #media #downloader #mediadownloaderunleashed