Whitecat18 / TP-LINK-AC600-RTL8811AU-RTL8821AU-DriversLinks
TP link AC600 Drivers for All Linux distros
☆21Updated last year
Alternatives and similar repositories for TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers
Users that are interested in TP-LINK-AC600-RTL8811AU-RTL8821AU-Drivers are comparing it to the libraries listed below
Sorting:
- Commands and Scripts to attack Linux and Servers☆33Updated last month
- Config files for my GitHub profile.☆13Updated 2 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆36Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆32Updated 10 months ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆47Updated 3 months ago
- ☆25Updated 6 months ago
- Activate your windows machines in one step.☆101Updated last year
- Simple Project that Extracts PE Information.☆18Updated 2 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆45Updated 2 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated 11 months ago
- ☆59Updated 8 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 8 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 4 months ago
- ☆39Updated 5 months ago
- ☆11Updated 2 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- ☆32Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆40Updated last month
- ☆100Updated 3 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- A list of all Active Directory machines from HackTheBox☆60Updated this week
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆47Updated 2 weeks ago
- ☆64Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago