Skeleton is a Social Engineering tool attack switcher
☆75Aug 1, 2020Updated 5 years ago
Alternatives and similar repositories for Skeleton
Users that are interested in Skeleton are comparing it to the libraries listed below
Sorting:
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Wordlist générator, router flood and Wifi Cracker☆52Apr 5, 2020Updated 5 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- Simple Doxing Tool☆351Oct 6, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Facebook phisher to get password and email of victim.☆29Mar 13, 2018Updated 7 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆10Nov 29, 2021Updated 4 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- v1ew-s0urce a recon tool built by the 5/9Dark team.☆92Feb 27, 2021Updated 5 years ago
- A Social Engineering Tool☆79Oct 28, 2024Updated last year
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago
- ☆15Jan 14, 2022Updated 4 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Jan 31, 2019Updated 7 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- A simple phishing tool that can phish almost any website☆76Nov 6, 2018Updated 7 years ago
- Crack ios Restriction PassCode in Python☆38Sep 30, 2020Updated 5 years ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickn…☆25Oct 18, 2021Updated 4 years ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- Hacker Community Remote Access Trojan☆27Mar 3, 2022Updated 4 years ago
- Free Tiktok likes, follower, views☆12Sep 7, 2022Updated 3 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Nov 30, 2023Updated 2 years ago
- Web App Pen Tester (Web Interface)☆32Dec 6, 2022Updated 3 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆14Aug 22, 2024Updated last year
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- ☆19Aug 17, 2018Updated 7 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Oct 2, 2022Updated 3 years ago