CosmodiumCS / MK15-SkeletonKeyLinks
SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆44Updated last year
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- ☆20Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- Social Engineering Browser Update Attack.☆57Updated last year
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆48Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆114Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago
- ☆26Updated last month
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆90Updated last year
- Browser streaming MITM proxy☆68Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- A powershell module for hiding payloads in the pixels of images☆65Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆31Updated 2 years ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆58Updated last year
- Python3 script to dump breach data from Dehashed☆32Updated last month
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- Malware vulnerability intel tool for third-party attackers☆121Updated 9 months ago
- A toolkit for your red team operations☆27Updated 3 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 10 months ago
- ☆123Updated last year
- Your go-to resource for all things OSINT☆179Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- Discord bot for the Shodan API - OSINT tool☆78Updated last year
- A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539☆58Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year