offensive-security / wireless-patches
Various Wireless Driver patches
☆32Updated 5 years ago
Alternatives and similar repositories for wireless-patches:
Users that are interested in wireless-patches are comparing it to the libraries listed below
- ☆36Updated 5 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆14Updated 12 years ago
- Kali Linux Windows App chroot builder script☆45Updated 5 years ago
- Kali Linux u-boot images☆26Updated 5 years ago
- kali-sly-pi☆33Updated 5 years ago
- ☆22Updated 5 years ago
- Various Kali Scripts☆55Updated 8 years ago
- gcc-arm-eabi-linaro-4.6.2☆24Updated 5 years ago
- gcc-arm-linux-gnueabihf-4.7/☆31Updated 5 years ago
- Kali Linux NetHunter utils package☆105Updated 5 years ago
- ☆46Updated 5 years ago
- Various Proxmark3 Mods☆56Updated 12 years ago
- ☆46Updated 8 years ago
- cSploit traffic manipulator☆29Updated 7 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 9 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆91Updated 5 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated last month
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- ParrotSec rootfs arm (armhf at the moment) builder.☆17Updated 7 years ago
- GSM Sniffer☆34Updated 13 years ago
- BlackArch Linux Keyring☆21Updated 6 years ago
- Password cracking utility☆53Updated 3 years ago
- MSF database code, gemified☆52Updated this week
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 6 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- ☆10Updated 10 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆11Updated 8 years ago