SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆46Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- an open source repository of courses, hence, "OpenCourse". The free and open-sourceness of this repository ensure a privacy respecting le…☆32Mar 5, 2023Updated 3 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆59Feb 7, 2024Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆111Apr 25, 2023Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆67Feb 1, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆67May 30, 2024Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆217Jul 22, 2025Updated 9 months ago
- Random experiments and shenanigans☆13Dec 6, 2025Updated 4 months ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆26Sep 22, 2025Updated 7 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Decrypt Chromium based browser passwords with PowerShell.☆137Mar 31, 2026Updated last month
- A Domain-Recon Automated Tool.☆15Feb 8, 2023Updated 3 years ago
- ☆12Mar 31, 2023Updated 3 years ago
- Osmocom SS7 stack, with Shadytel modifications.☆19Aug 2, 2012Updated 13 years ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- ⚠️ Malware Development training ⚠️☆41Feb 24, 2025Updated last year
- Open Source CANbus hacking project.☆14Oct 15, 2020Updated 5 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- An OSINT Geolocalization tool for Telegram that find nearby users and groups 📡🌍🔍☆13Aug 23, 2023Updated 2 years ago
- Read and write AES-256 encrypted files to an NFC implant (xSIID)☆13Jan 19, 2024Updated 2 years ago
- Retr0's Hacking Scripts☆10Apr 19, 2023Updated 3 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- A minimal CLI client for CRXcavator.io☆15Dec 8, 2022Updated 3 years ago
- ☆37Feb 1, 2026Updated 2 months ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Token impersonation. Administrator to SYSTEM. No tools required.☆15Mar 26, 2026Updated last month
- ☆17Mar 22, 2026Updated last month
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- A tweaked version of SdFat to improve block read speed☆11Nov 23, 2015Updated 10 years ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆268Mar 26, 2023Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago