SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆46Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below
Sorting:
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- an open source repository of courses, hence, "OpenCourse". The free and open-sourceness of this repository ensure a privacy respecting le…☆31Mar 5, 2023Updated 2 years ago
- An Obsidian.md theme inspired by the Cosmodium CyberSecurity colorway.☆19Mar 5, 2024Updated last year
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 6 months ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆25Sep 22, 2025Updated 5 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆66May 30, 2024Updated last year
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆23Jan 29, 2024Updated 2 years ago
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆21Oct 20, 2024Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆213Jul 22, 2025Updated 7 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Feb 1, 2023Updated 3 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- My Windows 11 dotfiles☆37Apr 20, 2025Updated 10 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆121Dec 23, 2025Updated 2 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆40May 6, 2023Updated 2 years ago
- Full Camect Hub integration for Home Assistant / HACS☆13Jan 15, 2025Updated last year
- ☆121Sep 13, 2023Updated 2 years ago
- Track Bluetooth devices and their proximity to a GPS location.☆23Apr 29, 2023Updated 2 years ago
- ☆35Feb 1, 2026Updated last month
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last week
- Effortlessly Find Comprehensive Information on Individuals with Our dedsec People Search Tool!☆35Apr 17, 2025Updated 10 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Dec 28, 2023Updated 2 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆10Jul 30, 2024Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Take down your target Telegram channels by this program☆13Nov 16, 2025Updated 3 months ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- ☆12Feb 4, 2025Updated last year
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- General purpose attack-defense range for zero-config deployment☆44Nov 20, 2025Updated 3 months ago
- Block Ads, Tracking, and Telemetry System Wide☆48Jul 26, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago