Whitecat18 / TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers
TP link AC600 Drivers for All Linux distros
☆19Updated 10 months ago
Alternatives and similar repositories for TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers:
Users that are interested in TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers are comparing it to the libraries listed below
- Commands and Scripts to attack Linux and Servers☆23Updated 4 months ago
- ☆19Updated last month
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆30Updated 11 months ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆31Updated 3 weeks ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆24Updated 5 months ago
- Activate your windows machines in one step.☆89Updated last year
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- ☆31Updated 3 weeks ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- 🕵️ Email osint tool☆62Updated last year
- Capture screenshots of onion services on an onion service.☆50Updated 7 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆381Updated 2 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆32Updated 6 months ago
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆41Updated 3 months ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆28Updated 2 years ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆26Updated last month
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- Tool for enumerating Active Directory environments☆46Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆28Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 9 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆21Updated 6 months ago
- Digital Forensics and Incident Response (DFIR)☆96Updated 3 weeks ago
- ☆60Updated 8 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆59Updated 10 months ago
- ☆15Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆46Updated 2 weeks ago