cyangy / A6210-mt76x2u_Ubuntu
A6210(mt7612u) driver for ubuntu
☆23Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for A6210-mt76x2u_Ubuntu
- ☆15Updated 2 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆10Updated 2 years ago
- ☆11Updated this week
- NOSNEX - Remake of fluxion for nethunter support☆9Updated 3 years ago
- Multithread FTP brute force tool☆9Updated 5 years ago
- ☆8Updated 4 years ago
- Obtain handshakes from networks out of your range!☆27Updated 3 years ago
- javascript redirect after installing a google chrome or mozilla firefox extension☆9Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- ☆17Updated 4 years ago
- tuorial VanillaRAT☆8Updated 5 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 2 years ago
- Apple wireless research and tools☆17Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆13Updated 6 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 2 years ago
- Plugins for airgeddon☆48Updated 3 weeks ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11Updated last year
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 3 years ago
- Mobile phone PWN tools and scripts☆13Updated 4 years ago
- Small tool to capture packets from Bluetooth devices.☆42Updated 10 months ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- ☆61Updated last year
- Script to check Kali Linux configs☆24Updated 5 years ago
- Scripts and tool for iOS app reversing☆25Updated 3 years ago
- Test WPA3 using virtual Wi-Fi interfaces☆49Updated 2 years ago
- ShockWave looks up for every connected device on the local network, then starts sending deauthentication packets to each of them. It is b…☆23Updated 4 years ago