evilsocket / BioIdentify
BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .
☆23Updated 15 years ago
Alternatives and similar repositories for BioIdentify:
Users that are interested in BioIdentify are comparing it to the libraries listed below
- Wardriving ekoparty☆15Updated 7 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- ☆24Updated 9 years ago
- Magnetic stripe spoofer implementing audio waves.☆38Updated 8 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- ☆11Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago