CosmodiumCS / MK15-SkeletonKey
SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
☆42Updated last year
Alternatives and similar repositories for MK15-SkeletonKey
Users that are interested in MK15-SkeletonKey are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- Discord bot using the cryptography toolkit of SkeletonKey☆11Updated 5 months ago
- ☆20Updated last year
- Collections of past presentation slides☆13Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆46Updated last year
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- 🤖 The Modern Port Scanner 🤖☆18Updated 3 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆33Updated last year
- Windows Remote Administration Tool that uses Discord as C2☆28Updated 2 years ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 7 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Xfinity / Comcast Wordlist Generator☆61Updated 2 years ago
- HID payloads for good purpose☆10Updated 4 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆57Updated 11 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆110Updated last year
- Browser streaming MITM proxy☆63Updated last year
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆33Updated last year
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆46Updated last year
- A toolkit for your red team operations☆27Updated 3 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆81Updated 9 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 9 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- ☆18Updated 4 years ago
- ☆39Updated 4 months ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆20Updated 3 years ago
- ☆25Updated last month
- an open source repository of courses, hence, "OpenCourse". The free and open-sourceness of this repository ensure a privacy respecting le…☆24Updated 2 years ago