Whitecat18 / TP-LINK-AC600-RTL8811AU-RTL8821AU-DriversLinks
TP link AC600 Drivers for All Linux distros
☆21Updated last year
Alternatives and similar repositories for TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers
Users that are interested in TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers are comparing it to the libraries listed below
Sorting:
- Commands and Scripts to attack Linux and Servers☆33Updated 2 months ago
- Config files for my GitHub profile.☆12Updated 3 months ago
- :)))))☆46Updated last week
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆33Updated 11 months ago
- Challenge Python☆19Updated 2 years ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆37Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated last year
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated last month
- ☆47Updated last month
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Script related in Active Directory Attacks Domain☆22Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆45Updated 4 months ago
- Tools and Resources for Physical Security Red Teaming☆34Updated 3 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- ☆27Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- ☆25Updated 7 months ago
- ☆40Updated 6 months ago
- OSCP Study Guide☆40Updated 2 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 5 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆48Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- Web Penetration Testing Course Materials☆32Updated last year