Found a version of this image that may be a pixelknot image.
The original image from https:// pbs.twimg.com/media/DoJjUrPUcAATUQD.jpg is not a pixelknot and has a standard JFIF header.
Did a reverse image search looking for other sites using that image, and I found a version that has an abnormal header very close to that of a pixelknot header (1 byte off) in this newsday article from 2016 about a Killory fundraiser:
https:// www.newsday.com/long-island/hillary-clinton-holds-33-400-a-head-hamptons-fundraiser-1.12238672
(direct image link: https:// cdn.newsday.com/polopoly_fs/1.12238881.1472525321!/httpImage/image.jpeg_gen/derivatives/landscape_768/image.jpeg)
For a pixelknot header, we expect:
First 6 bytes to be: ff d8 ff db 00 84
Also the 4 bytes starting at 0x88 should be: ff c0 00 11
The header in the modified image is only off by the 5th byte which is a 43 instead of 84.
Have tried the f5.jar with numerous password guesses (strings from that article, Evergreen, Eagle, Renegade, etc.), but haven't gotten lucky. Did anyone ever figure out a way to brute force pixelknot?