SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆46Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an open source repository of courses, hence, "OpenCourse". The free and open-sourceness of this repository ensure a privacy respecting le…☆32Mar 5, 2023Updated 3 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆58Feb 7, 2024Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆111Apr 25, 2023Updated 3 years ago
- An Obsidian.md theme inspired by the Cosmodium CyberSecurity colorway.☆19Mar 5, 2024Updated 2 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆171May 24, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Interactive shell to execute commands anonymously using Proxychains and Tor☆81Feb 1, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆19Jun 12, 2025Updated 11 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆50Aug 16, 2025Updated 9 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆215Jul 22, 2025Updated 9 months ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆26Sep 22, 2025Updated 7 months ago
- Pentester's toolbox☆12May 1, 2026Updated 2 weeks ago
- ☆121Sep 13, 2023Updated 2 years ago
- A modular Python bot that integrates with Discord☆53Jan 9, 2023Updated 3 years ago
- AbuseIPDB integration enabling automatic reporting of malicious activity detected by T-Pot honeypots by monitoring logs, analyzing attack…☆19Updated this week
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- URL Fuzzer☆21Nov 22, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Bash wrapper for NetExec to quickly validate compromised credentials across SMB, WinRM, RDP, MSSQL, and FTP☆82May 1, 2026Updated 2 weeks ago
- ⚠️ Malware Development training ⚠️☆43Feb 24, 2025Updated last year
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆129Dec 23, 2025Updated 4 months ago
- An OSINT Geolocalization tool for Telegram that find nearby users and groups 📡🌍🔍☆13Aug 23, 2023Updated 2 years ago
- ☆14Aug 26, 2017Updated 8 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆101Jun 18, 2020Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Read and write AES-256 encrypted files to an NFC implant (xSIID)☆14Jan 19, 2024Updated 2 years ago
- Atmel Smart ARM devices CMSIS module for Arduino IDE☆24May 1, 2021Updated 5 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Token impersonation. Administrator to SYSTEM. No tools required.☆16Mar 26, 2026Updated last month
- Python version of Praeda (Praeda-II) a MFP data harvesting tool☆14Feb 2, 2026Updated 3 months ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- ☆15Jun 5, 2024Updated last year