KURO-CODE / SkeletonLinks
Skeleton is a Social Engineering tool attack switcher
☆72Updated 5 years ago
Alternatives and similar repositories for Skeleton
Users that are interested in Skeleton are comparing it to the libraries listed below
Sorting:
- Wordlist générator, router flood and Wifi Cracker☆51Updated 5 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- There are three ways to create an email bomb Mass mailing☆67Updated 3 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆46Updated 7 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆83Updated last year
- Paypal phishing tool☆30Updated 7 years ago
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- Yahoo, Gmail and Hotmail Accounts Cracker☆38Updated 10 years ago
- SMS/Email/whatsapp Bombers Collection.☆34Updated 5 years ago
- htk-lite is a lighter version of hackers-tool-kit but it still has the same hacking ability as hackers-tool-kit☆116Updated 3 years ago
- A Tool For Lazy People.☆31Updated 4 years ago
- PHP email spoofer | Send emails from any email adress☆83Updated 5 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆140Updated 4 years ago
- Information Gathering Tool☆58Updated 2 years ago
- Combo List Generator for Android Devices (Termux) by @Voldemort1912.☆87Updated 4 years ago
- Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github, Yahoo, Protonmail, Google, Spotify, Netflix, Linkedin, Wordpress, Origi…☆94Updated 4 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆129Updated 8 years ago
- A PHP tool to perform dictionary attacks on Gmail, Microsoft Live and Hotmail accounts.☆137Updated 2 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆110Updated 3 years ago
- Using open Adb ports we can exploit a devive☆98Updated 4 years ago
- A Simple work in progress DDOS BOTNET coded in python Which also runs TOR☆82Updated 6 years ago
- The EVIL EMAIL/SMS BOMBER is made for research and testing purposes only. Prank your friends. EVIL EMAIL/SMS BOMBER can send bulk mail …☆46Updated 3 years ago
- Includes Spoof kit, Phishing Tool Kit, Credit Card Scanner, IP Sniffer, KeyLoggers, Tabnabbing, RansomWare, Viruses, RATS And More . . .☆45Updated 6 years ago
- Facebook Brute Forcer in shellscript using TOR☆32Updated 7 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- This is a call and sms bomber that can be used in various works☆80Updated 8 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆112Updated last year
- Automated Payload Generator Tool☆108Updated 4 years ago
- Espionaje y recopilación de Información☆98Updated 3 years ago
- USE THIS TOOL AGAINST SPAMMERS, THIS TOOL IS SO POWERFULL. ITS MAIN ABILITY IS CALL FLOODING.☆22Updated 4 years ago