thugcrowd / gangshitLinks
Figlet fonts for crimes
☆48Updated last year
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated 2 years ago
- Simple Go Discord Bot☆23Updated 2 years ago
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆63Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆18Updated 3 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆41Updated 2 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆114Updated last year
- Integrated web scraper and email account data breach comparison tool☆78Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Docker environment for hackers☆17Updated 5 years ago
- Dumb USB HID gadget creator for Android (for triggering device driver install on Windows for LPE)☆143Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- brute force SSH public-key authentication☆79Updated 5 months ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆81Updated 5 years ago