evilsocket / BioIdentifyLinks
BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .
☆23Updated 16 years ago
Alternatives and similar repositories for BioIdentify
Users that are interested in BioIdentify are comparing it to the libraries listed below
Sorting:
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- RFID spoofing code from scanlime.org☆20Updated 12 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Kerby - Light weight video surveillance system.☆9Updated 16 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 12 years ago
- XSS payload designed to steal LastPass users' credentials☆17Updated 11 years ago
- Carve shellcode within the memory using restrictive character set☆9Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆28Updated 8 years ago
- Default Payloads to Attach to Emails When Using Gophish☆9Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago