CosmodiumCS / MK15-SkeletonKeyLinks
SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆45Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- ☆21Updated 2 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 2 months ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- Browser streaming MITM proxy☆74Updated 2 years ago
- ☆124Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 9 months ago
- A powershell module for hiding payloads in the pixels of images☆76Updated last year
- :')☆47Updated 4 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 3 weeks ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- A collection of tools that I use in CTF's or for assessments☆106Updated 11 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Updated last year
- a collection of pdfs i like to read☆25Updated 2 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆91Updated this week
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆113Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆63Updated last year