thugcrowd / gangshitLinks
Figlet fonts for crimes
☆46Updated last year
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- Simple Go Discord Bot☆23Updated 2 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆51Updated last year
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆41Updated 2 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆18Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆110Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆113Updated 11 months ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆142Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- zero-trust remote firewall instrumentation☆252Updated last year
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Integrated web scraper and email account data breach comparison tool☆79Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- A tool to extract useful data from documents☆155Updated 9 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- brute force SSH public-key authentication☆78Updated 3 months ago