TP-Link Archer T2U Plus / AC600 High Gain USB Wifi Adapter Review & Driver installation Guide for Kali Linux.
☆26Jan 25, 2023Updated 3 years ago
Alternatives and similar repositories for archer_t2u_plus_linux_installation
Users that are interested in archer_t2u_plus_linux_installation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for basic security, privacy and optimization settings for windows machines.☆23Oct 27, 2023Updated 2 years ago
- SIFA-based attacks on AES☆38Dec 14, 2024Updated last year
- Boost your network's security with our services in Wireless Penetration Testing. We offer comprehensive vulnerability assessments, identi…☆18Feb 4, 2024Updated 2 years ago
- ☆11May 10, 2019Updated 6 years ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This software allows you to perform a deauth attack with an ESP8266 against selected networks. The ESP8266 is a cheap and easy to use Wi-…☆10Sep 28, 2023Updated 2 years ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 5 months ago
- MG community edition is an open source pentesting tool to generate payloads for HID attacks.☆18Jan 3, 2018Updated 8 years ago
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- CC1101 Library for ESP32/ESP8266☆17Jul 14, 2020Updated 5 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- A collection of OSINT websites and tools to aid penetration testers with their info gathering tasks☆17Oct 27, 2024Updated last year
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Apktool in Kali Linux, Termux, Ubuntu, Parrot OS maintained by EFX Tv☆20Jan 26, 2026Updated 3 months ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 8 years ago
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- New-Generation OSINT Framework☆22May 19, 2025Updated 11 months ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆25Oct 26, 2024Updated last year
- BusyBox building with command ndk-build☆14Jun 18, 2024Updated last year
- This is a repository to list plugins available for rclone-webui-react☆28Aug 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Phishing attack identification tool - Performs email risk evaluations relying on different black lists, machine learning techniques, and …☆18Feb 27, 2023Updated 3 years ago
- A script for 802.11 mass-deauthentication☆30Jul 2, 2014Updated 11 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated 2 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- ☆20Sep 29, 2025Updated 7 months ago
- Legacy Rucky Binaries☆11Feb 11, 2020Updated 6 years ago
- 22-23-24 Temmuz 2022 Tarihinde yapılan Siber Güvenlik Eğitimlerine Ait Dökümanlar☆30Jan 19, 2026Updated 3 months ago
- An interactive data visualization application developed in Python☆16Sep 5, 2021Updated 4 years ago
- HackGPT is a collective one place resource project that reverse engineers ChatGPT to unleash it's full potential for creating smarter, mo…☆31Jul 28, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is a PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆23Jul 21, 2025Updated 9 months ago
- Mass Reverse IP Lookup is a multithreaded tool to reverse ip lookup a list of ip addresses using yougetsignal.com .☆20May 23, 2020Updated 5 years ago
- Simple Auto WPS Pixie Dust Attack script for walking (using Wifite2)☆13Dec 22, 2019Updated 6 years ago
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 3 years ago
- Full tutorial about how to install Quartus Prime software in different systems☆19Nov 8, 2024Updated last year
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 6 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago