Download and View Skype History Without Skype
☆56May 18, 2018Updated 7 years ago
Alternatives and similar repositories for skype-log-viewer
Users that are interested in skype-log-viewer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Brute forcer and shell deployer for WildFly☆99Mar 10, 2018Updated 8 years ago
- ☆12Aug 29, 2025Updated 7 months ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆419Aug 10, 2023Updated 2 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting …☆86Jul 18, 2017Updated 8 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆81Jun 30, 2018Updated 7 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23May 1, 2014Updated 11 years ago
- PowerShell Reverse HTTPs Shell☆31Nov 14, 2014Updated 11 years ago