Whitecat18 / TP-LINK-AC600-RTL8811AU-RTL8821AU-DriversLinks
TP link AC600 Drivers for All Linux distros
☆23Updated last year
Alternatives and similar repositories for TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers
Users that are interested in TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers are comparing it to the libraries listed below
Sorting:
- Commands and Scripts to attack Linux and Servers☆33Updated 7 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated last year
- Config files for my GitHub profile.☆14Updated 3 weeks ago
- ☆25Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆110Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆36Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- :')☆46Updated 3 months ago
- ☆44Updated 11 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 7 months ago
- Challenge Python☆19Updated 2 years ago
- ☆25Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆43Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆77Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- ☆24Updated 10 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆64Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆89Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- OSCP Study Guide☆41Updated 3 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆20Updated 5 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago