arjuninv / CogniTrackLinks
CogniTrack is an Artificial Intelligence powered person tracking system that acquires images from CCTV cameras and tracks individuals appearing in the frame in real-time.
☆33Updated 2 years ago
Alternatives and similar repositories for CogniTrack
Users that are interested in CogniTrack are comparing it to the libraries listed below
Sorting:
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- Skeleton is a Social Engineering tool attack switcher☆71Updated 5 years ago
- a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, e…☆50Updated 2 years ago
- Evil twin tool.☆36Updated 4 years ago
- Grab target's webcam shots by link☆20Updated 5 years ago
- this FUD Payload☆39Updated 4 years ago
- Evilip Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. E…☆31Updated 2 years ago
- Creepy stalking tool to process security camera motion triggered images and sort seen objects in different categories, detect license pla…☆180Updated 2 years ago
- Beef Over AWS is a tool that allows you to use Beef-XSS over WAN securly and anonymously.☆41Updated 4 years ago
- 🔍sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ʟᴏᴏᴋᴜᴘ🔍☆25Updated 3 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 4 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆23Updated 4 years ago
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆29Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- Python script attack all social media accounts☆17Updated 2 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- A Complete Phishing Tool☆35Updated 5 years ago
- Bypass Two-Factor-Authentication☆43Updated 8 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Updated 4 years ago
- Machine Learning (Easy to Hard step by step)☆46Updated 5 years ago
- Simple python script to get phone number information from any country.☆44Updated last year
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- Analyzing CCTV videos to find interesting events☆73Updated 7 years ago
- An encrypted notebook☆33Updated 2 years ago
- WiFi-Jammer/DoS toolset☆62Updated 5 years ago
- Check if an email OR phone number OR username if is associated with a facebook account , and get some information about the account☆66Updated 2 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆46Updated 8 years ago
- ncorbuk / Python-Tutorial---Hunt-Down-Social-Media-Accounts-by-Usernames-for-Open-Source-Intelligence-Python Tutorial - || Hunt Down Social Media Accounts by Usernames for Open-Source Intelligence ||☆76Updated 3 years ago
- Face Recognition Security☆175Updated last year
- ☆19Updated 4 years ago