thugcrowd / gangshitLinks
Figlet fonts for crimes
☆50Updated 2 years ago
Alternatives and similar repositories for gangshit
Users that are interested in gangshit are comparing it to the libraries listed below
Sorting:
- Generate CIA/NSA style project codenames☆21Updated 8 years ago
- A robust information gathering tool for large scale reconnaissance on Internet Relay Chat servers 🛰️☆53Updated 2 years ago
- A Voip Wardialer for the phreaking of 2020☆56Updated last year
- Simple Go Discord Bot☆23Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆19Updated 3 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆111Updated 2 years ago
- Check if your provider is blocking you!☆104Updated 3 years ago
- A simple yet beautiful phishing proxy.☆59Updated 4 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Analyse binaries for missing security features, information disclosure and more...☆87Updated 2 years ago
- brute force SSH public-key authentication☆78Updated 8 months ago
- Auto discover and exploit LAN raspberry pi's☆109Updated last year
- Generates several passwords based on one single word, like a company's name.☆25Updated 4 years ago
- Real-time chat without using Javascript.☆18Updated 8 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- Command-line client to interact with Hack The Box☆16Updated 5 years ago
- Legba recipes.☆51Updated last year
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆44Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Updated 5 years ago
- Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆55Updated 5 years ago
- Pillage filesystems for sensitive information with Go 🔍☆301Updated 2 months ago
- Different methods to obfuscate URLs☆29Updated 8 years ago