evilsocket / EigetronLinks
Face recognition program that uses Eigen faces with a fast Jacobi eigen decomposition
☆13Updated 16 years ago
Alternatives and similar repositories for Eigetron
Users that are interested in Eigetron are comparing it to the libraries listed below
Sorting:
- Kerby - Light weight video surveillance system.☆9Updated 15 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆14Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 5 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- ☆28Updated 4 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Updated 3 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- A ton of helpful tools☆16Updated 8 years ago
- SoftWire is a class library written in object-oriented C++ for compiling assembly code. It can be used in projects to generate x86 machi…☆25Updated 16 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- RSA cracking library☆9Updated 4 years ago
- ☆15Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- This program show you IMSI numbers of cellphones around you.☆13Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Proof of Concepts, Exploits☆28Updated last month
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- ☆20Updated 9 years ago