CosmodiumCS / MK15-SkeletonKeyLinks
SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆45Updated 2 years ago
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 3 weeks ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated 2 years ago
- ☆26Updated 3 months ago
- Social Engineering Browser Update Attack.☆55Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- ☆21Updated last year
- Browser streaming MITM proxy☆71Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated last month
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆134Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆100Updated last year
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆40Updated last month
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 4 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆50Updated last year
- A toolkit for your red team operations☆28Updated 3 years ago
- Fork from @rsmudge/armitage☆136Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated this week
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆112Updated 2 years ago
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆27Updated 4 years ago