drygdryg / rtl8188eus
RealTek RTL8188eus WiFi driver with monitor mode & frame injection support
☆22Updated 2 years ago
Alternatives and similar repositories for rtl8188eus:
Users that are interested in rtl8188eus are comparing it to the libraries listed below
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆80Updated 2 years ago
- Hikvision Backdoor using Shodan. Python file that scans IP's from Shodan.☆17Updated last year
- Shodan Dorks for Advanced OSINT☆23Updated 2 months ago
- HTTP_POST Login BruteForce☆34Updated 2 years ago
- Random OSINT idea tool thing☆15Updated last year
- Automation of the wireless network auditor, "wifite"☆64Updated 2 months ago
- Obtains IP Information With A Shortened URL☆50Updated 2 months ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆38Updated 4 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆29Updated last week
- A simple application that will help you determine the usb device. It will be useful when choosing an adapter as it displays the chipset!☆54Updated last year
- GovCracker is the best Wrapper and GUI for Hashcat, John the Ripper, PRINCE, Maskprocessor, Wordlister, CUPP, etc.☆55Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆103Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆50Updated 2 years ago
- Xfinity / Comcast Wordlist Generator☆59Updated last year
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆67Updated 2 weeks ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆55Updated 4 years ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆37Updated 8 months ago
- My Wi-Fi scripts☆45Updated 7 months ago
- The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)☆62Updated 8 months ago
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆103Updated last year
- Plugins for airgeddon☆57Updated 2 months ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆38Updated last year
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆17Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- ☆17Updated 3 months ago
- karma WiFi attack implementation☆48Updated 3 months ago
- WPS pin generator written in Python 3☆44Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆40Updated 6 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆65Updated 6 months ago
- ☆16Updated 2 months ago