evilsocket / Kerby_Surveillance
Kerby - Light weight video surveillance system.
☆9Updated 15 years ago
Alternatives and similar repositories for Kerby_Surveillance:
Users that are interested in Kerby_Surveillance are comparing it to the libraries listed below
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Face recognition program that uses Eigen faces with a fast Jacobi eigen decomposition☆13Updated 15 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- ☆17Updated 9 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆29Updated 11 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 14 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 3 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆27Updated 8 years ago
- See here:☆42Updated 12 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago