CosmodiumCS / MK15-SkeletonKeyLinks
SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆45Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆64Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 3 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆55Updated 2 years ago
- ☆125Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆113Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 6 years ago
- Browser streaming MITM proxy☆75Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- ☆48Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆120Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- ☆26Updated 7 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- Discord bot for the Shodan API - OSINT tool☆83Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆29Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆16Updated last month
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆137Updated 3 weeks ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆53Updated 4 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆17Updated last year