Stars
A fingerprint identification system that goes through a process of filtering, to determine if the users fingerprint matches the fingerprint registered. The captured fingerprint is processed through…
BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .
Fingerprint recognition engine for .NET that takes a pair of human fingerprint images and returns their similarity score. Supports efficient 1:N search.
Script to automate the uploading of Kismet WarDriving logs
Organized list of my malware development resources
Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)
Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malicious extension or script on most popular browsers, and send …
All things to do after installing Kali Linux and Add more awesome hacking tools to your Kali Linux system
Extract and decrypt browser data, supporting multiple data types, runnable on various operating systems (macOS, Windows, Linux).
Hacking systems with the automation of PasteJacking attacks.
Tools & Interesting Things for RedTeam Ops
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat…
A repository with 3 tools for pwn'ing websites with .git repositories available
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Searches for .txt files containing specified string in all drives.
This is a PowerShell Script that scans the local network to find alive hosts.
Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.
Steal All Browser Credentials Via BasUSB Attack In 5 Seconds.
A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others Tools
Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert Entry.
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Tutorials, tools, and more as related to reverse engineering video games.