
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
A .NET library to wrap the functionality of ExifTool.
To create a simple wrapper around this excellent program to allow .NET programs to easily access exif data for images.
using System.Threading.Tasks;
using NExifTool;
namespace Test
{
public class Example
{
public async Task Test(string srcFilename)
{
var et = new ExifTool(new ExifToolOptions());
var list = await et.GetTagsAsync(srcFilename);
// use list...
}
}
}
The exiftool.xml file was produced using the latest ExifTool on my system,
using the command: exiftool -listx. This file is then processed to produce
a lookup table of tags / english descriptions, which is then used when
parsing out the results. This xml file is the input to the XSLT that
generates the TagMetadata.cs file.
I'm happy to accept pull requests. By submitting a pull request, you must be the original author of code, and must not be breaking any laws or contracts.
Otherwise, if you have comments, questions, or complaints, please file issues to this project on the github repo.
I hope to make many improvements to the library as time permits.
NExifTool is licensed under the MIT license. See LICENSE.md for more information.
FAQs
.Net wrapper for the excellent ExifTool
We found that nexiftool demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.