thugcrowd / gangshitLinks
Figlet fonts for crimes
☆46Updated last year
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆18Updated 3 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated last year
- Simple Go Discord Bot☆23Updated 2 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- zero-trust remote firewall instrumentation☆251Updated last year
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- Grep Web pages with extra features like JS deobfuscation and OCR☆110Updated last year
- Create automated tasks and keep an eye on interesting things!☆83Updated 6 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- Multi-head SSH honeypot system.☆21Updated last year
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆23Updated 3 years ago
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 4 years ago
- Private and self-hosted file sharing over the Tor network written in golang☆119Updated 2 months ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 6 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆76Updated 5 years ago
- A small, fluid, low-interaction honeypot☆19Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago