evilsocket / BioIdentify
BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .
☆24Updated 15 years ago
Related projects ⓘ
Alternatives and complementary repositories for BioIdentify
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 11 years ago
- Attacking WPA/WPA encrypted access point without client.☆48Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Vulnerability Scanner☆12Updated 9 years ago
- Wi-Fi Backdoors☆37Updated 9 years ago
- Kerby - Light weight video surveillance system.☆9Updated 15 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Updated 6 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 11 years ago
- ☆15Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 8 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Updated 6 years ago
- ☆11Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago