KURO-CODE / SkeletonLinks
Skeleton is a Social Engineering tool attack switcher
☆73Updated 5 years ago
Alternatives and similar repositories for Skeleton
Users that are interested in Skeleton are comparing it to the libraries listed below
Sorting:
- There are three ways to create an email bomb Mass mailing☆66Updated 3 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- Wordlist générator, router flood and Wifi Cracker☆51Updated 5 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆48Updated 7 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆113Updated 4 years ago
- Simple script masks the phishing link under the normal URL☆86Updated 4 years ago
- Paypal phishing tool☆30Updated 7 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Updated 2 years ago
- SMS/Email/whatsapp Bombers Collection.☆34Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆133Updated 9 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆47Updated 8 years ago
- PHP email spoofer | Send emails from any email adress☆83Updated 5 years ago
- Information Gathering Tool☆57Updated 2 years ago
- Facebook Brute Forcer in shellscript using TOR☆34Updated 7 years ago
- Automated Payload Generator Tool☆108Updated 5 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆137Updated 4 years ago
- Includes Spoof kit, Phishing Tool Kit, Credit Card Scanner, IP Sniffer, KeyLoggers, Tabnabbing, RansomWare, Viruses, RATS And More . . .☆45Updated 7 years ago
- Toolkit Hacking☆70Updated 3 years ago
- Using open Adb ports we can exploit a devive☆99Updated 4 years ago
- wifisky Python script for pentesting wireless networks☆102Updated 6 years ago
- Crypton: linux Pentester tools, penetration testing and ethical hacking☆66Updated 7 years ago
- Python Script to help/automate the WiFi hacking exercises.☆88Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- This python script will capture all of the keystrokes within a given time frame and report them to a Discord Server using Webhooks. Inste…☆28Updated 6 months ago
- Using Social Engineering To Obtain WiFi Passwords☆101Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆58Updated 8 years ago
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 7 years ago
- Combo List Generator for Android Devices (Termux) by @Voldemort1912.☆85Updated 4 years ago
- Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber...☆78Updated 3 years ago