SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆46Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- an open source repository of courses, hence, "OpenCourse". The free and open-sourceness of this repository ensure a privacy respecting le…☆32Mar 5, 2023Updated 3 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆59Feb 7, 2024Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆111Apr 25, 2023Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Jan 29, 2024Updated 2 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆18Jun 12, 2025Updated 9 months ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Sep 22, 2017Updated 8 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆26Sep 22, 2025Updated 6 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Decrypt Chromium based browser passwords with PowerShell.☆135Mar 31, 2026Updated last week
- ☆121Sep 13, 2023Updated 2 years ago
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- AbuseIPDB integration enabling automatic reporting of malicious activity detected by T-Pot honeypots by monitoring logs, analyzing attack…☆16Mar 24, 2026Updated 2 weeks ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- ☆11Aug 26, 2024Updated last year
- ☆16Mar 22, 2023Updated 3 years ago
- URL Fuzzer☆20Nov 22, 2024Updated last year
- Control the amount of memory Firefox uses. if it works for you, use it and if it does not, don’t use it. It is as simple as that!☆14May 20, 2018Updated 7 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- An open-source self-hosted purple team management web application.☆27Dec 10, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Red Team Operator: Malware Development Essentials Course☆101Jun 18, 2020Updated 5 years ago
- Retr0's Hacking Scripts☆10Apr 19, 2023Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- A minimal CLI client for CRXcavator.io☆15Dec 8, 2022Updated 3 years ago
- ☆37Feb 1, 2026Updated 2 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Token impersonation. Administrator to SYSTEM. No tools required.☆14Mar 26, 2026Updated 2 weeks ago
- ☆17Mar 22, 2026Updated 2 weeks ago
- Clone from the Osmocom sim-tools.git with added features☆17Jan 22, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Simple, production ready, HTTP server for static file serving☆12Apr 1, 2023Updated 3 years ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Mar 26, 2023Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆29Aug 4, 2021Updated 4 years ago
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆37Apr 17, 2025Updated 11 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆77Dec 10, 2025Updated 3 months ago