Skeleton is a Social Engineering tool attack switcher
☆75Aug 1, 2020Updated 5 years ago
Alternatives and similar repositories for Skeleton
Users that are interested in Skeleton are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Wordlist générator, router flood and Wifi Cracker☆52Apr 5, 2020Updated 6 years ago
- Simple Doxing Tool☆358Oct 6, 2023Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- A Social Engineering Tool☆81Oct 28, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Nov 30, 2023Updated 2 years ago
- Social engineering tool for human hacking☆125Nov 7, 2016Updated 9 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 8 years ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 11 months ago
- ☆16Jan 14, 2022Updated 4 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆46Apr 3, 2018Updated 8 years ago
- Tool To Gather Sensitive Information About Target IP☆27Apr 13, 2023Updated 3 years ago
- Herramienta para obtener información y ubicación, de una dirección IP o Dominio.☆11Mar 27, 2020Updated 6 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Multi-Tool Beamer Made Using Python | Version v1.0 | DM Me For Price & Buying.☆13Jul 9, 2023Updated 2 years ago
- Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber...☆79Apr 25, 2022Updated 3 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Free Tiktok likes, follower, views☆13Sep 7, 2022Updated 3 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- Experience zero-effort Gradient farming on gradient.network! 🚀 Our bot automates every part — account setup, email, proxies and even air…☆21Jun 5, 2025Updated 10 months ago
- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It oc…☆16Jan 21, 2023Updated 3 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15May 20, 2016Updated 9 years ago
- Cypher-Multitool is a 'Hacking' Multitool written by me in Batch, don't steal the source code :). It's a MINI version of it, the MEGA ver…☆27Oct 12, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 6 years ago
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by…☆43Mar 9, 2021Updated 5 years ago
- Crack ios Restriction PassCode in Python☆38Sep 30, 2020Updated 5 years ago
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- Identify connection of sessions for social engineering attacks.☆58Nov 15, 2016Updated 9 years ago
- Simple ML Algorithm to detect licence plates☆13Nov 22, 2022Updated 3 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆190May 5, 2025Updated 11 months ago
- ☆15Jul 18, 2023Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- All Zero Day Exploits☆21Oct 14, 2017Updated 8 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- Manage Android application in Linux (CLI)☆25Oct 12, 2022Updated 3 years ago