drygdryg / rtl8188eusLinks
RealTek RTL8188eus WiFi driver with monitor mode & frame injection support
☆24Updated 3 years ago
Alternatives and similar repositories for rtl8188eus
Users that are interested in rtl8188eus are comparing it to the libraries listed below
Sorting:
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Updated 2 years ago
- This Kali Linux Docker container offers a full desktop experience by using the tightvncserver to provide a VNC connection to the containe…☆85Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 2 years ago
- A Tool that Finds, Enumerates, and Exploits Reolink Cameras.☆123Updated 4 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆96Updated 3 years ago
- WPS pin generator written in Python 3☆56Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆49Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- A simple, dockerized python based Command and Control(C2) Framework named SpyderC2☆38Updated 2 years ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Updated last year
- My Wi-Fi scripts☆50Updated last year
- A new generation web interface for Hashcat☆36Updated last year
- Full Valid Fake Data Generator☆101Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Simple program to steal private files from removable storages☆87Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- HTTP_POST Login BruteForce☆36Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆26Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- Fetching passwords from the chrome browser database☆91Updated 2 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆54Updated last month
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆29Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year