thugcrowd / gangshitLinks
Figlet fonts for crimes
☆48Updated last year
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- Simple Go Discord Bot☆23Updated 2 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆41Updated 2 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆52Updated 2 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- Generate CIA/NSA style project codenames☆21Updated 8 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆18Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Create automated tasks and keep an eye on interesting things!☆86Updated 3 weeks ago
- A simple yet beautiful phishing proxy.☆60Updated 4 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆56Updated 2 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆111Updated 2 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- 🌠 The World's Fastest StegCracker 🌠☆28Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Legba recipes.☆51Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆26Updated 3 weeks ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- ☆23Updated last year
- CLI tools using Harpoon features☆23Updated 2 years ago