evilsocket / Eigetron
Face recognition program that uses Eigen faces with a fast Jacobi eigen decomposition
☆13Updated 15 years ago
Alternatives and similar repositories for Eigetron:
Users that are interested in Eigetron are comparing it to the libraries listed below
- Kerby - Light weight video surveillance system.☆9Updated 15 years ago
- Wi-Fi Backdoors☆37Updated 9 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆13Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23Updated 15 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 7 years ago
- SoftWire is a class library written in object-oriented C++ for compiling assembly code. It can be used in projects to generate x86 machi…☆25Updated 15 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- This program show you IMSI numbers of cellphones around you.☆12Updated 7 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- new WPS attack tool☆55Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 7 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆59Updated 6 years ago
- Some NSE scripts to search information from routers☆37Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- This version touches disk for registry persistence.☆25Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- TCP session interception and injection framework☆56Updated 13 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆41Updated 3 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago