thugcrowd / gangshitLinks
Figlet fonts for crimes
☆46Updated last year
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- Simple Go Discord Bot☆22Updated 2 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated last year
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆18Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- 🌠 The World's Fastest StegCracker 🌠☆28Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Grep Web pages with extra features like JS deobfuscation and OCR☆110Updated last year
- Let's brute force this hotel's tv.☆81Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- zero-trust remote firewall instrumentation☆251Updated last year
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A simple yet beautiful phishing proxy.☆56Updated 3 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Docker environment for hackers☆16Updated 5 years ago
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- ☆10Updated 3 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆111Updated 10 months ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆49Updated 5 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago