evilsocket / Eigetron
Face recognition program that uses Eigen faces with a fast Jacobi eigen decomposition
☆13Updated 15 years ago
Alternatives and similar repositories for Eigetron:
Users that are interested in Eigetron are comparing it to the libraries listed below
- Kerby - Light weight video surveillance system.☆9Updated 15 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆13Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Pentest tools for Windows hacking processes☆13Updated 8 years ago
- This program show you IMSI numbers of cellphones around you.☆13Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆29Updated 11 years ago
- Proof of Concepts, Exploits☆28Updated 3 weeks ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23Updated 15 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- My metasploit modules☆23Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- TCP session interception and injection framework☆55Updated 14 years ago
- Utility to decompress Linux swsusp hibernation file.☆27Updated 3 years ago
- Tools and scripts for penetration testing☆18Updated 4 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- new WPS attack tool☆55Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago