thugcrowd / gangshitLinks
Figlet fonts for crimes
☆46Updated last year
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆50Updated 2 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆18Updated 3 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Simple Go Discord Bot☆23Updated 2 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- zero-trust remote firewall instrumentation☆252Updated last year
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆114Updated last year
- ☆11Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆63Updated 4 years ago
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆114Updated last year
- Create automated tasks and keep an eye on interesting things!☆85Updated 8 months ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Updated 5 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago