bhattsameer / Face-recognitionLinks
Face-recognition using python 2+ opencv
☆7Updated 7 years ago
Alternatives and similar repositories for Face-recognition
Users that are interested in Face-recognition are comparing it to the libraries listed below
Sorting:
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- A Simple Keylogger☆18Updated 6 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆26Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆15Updated 5 years ago
- PHP Application To Spoof And Send E-mail.☆11Updated 9 years ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆41Updated 6 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Updated 4 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Updated 8 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Updated 4 years ago
- detect trojans in an easy way 🛡️☆29Updated 6 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆16Updated 6 years ago
- ☆15Updated 3 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 6 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 3 weeks ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- ReverseIPLookUpUnlimted☆8Updated 5 years ago
- AIL framework - Analysis Information Leak framework☆7Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Bing Dork Scanner and simple sqli-injection checker☆15Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Gmail phishing page sample☆67Updated 4 years ago
- steal password mozilla firefox ,windows,Linux☆12Updated 4 years ago
- this FUD Payload☆39Updated 3 years ago