☆10May 30, 2015Updated 10 years ago
Alternatives and similar repositories for Skiddiemonkeys
Users that are interested in Skiddiemonkeys are comparing it to the libraries listed below
Sorting:
- ☆14Dec 5, 2014Updated 11 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Crane POAM Automation Tool (C-PAT™)☆15Feb 24, 2026Updated last week
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Feb 2, 2017Updated 9 years ago
- Timers for discord.py powered bots.☆11Dec 23, 2019Updated 6 years ago
- ☆12May 1, 2023Updated 2 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Trello Clone Android Application Using Kotlin Languange☆11Jul 26, 2020Updated 5 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Course material for University of Texas, Computer Science Department course CS 361 - Introduction to Computer Security☆11Nov 17, 2015Updated 10 years ago
- A docker container with different testing tools.☆13Jan 31, 2024Updated 2 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Helm charts for deploying Malcolm☆16Feb 19, 2026Updated last week
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- pIpe is ifttt for websites/webservices linked to webservices/smartphones/desktops with advanced filters☆224Oct 1, 2012Updated 13 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- A small command line application that pulls temps of various hardware components using Open Hardware Monitor Lib, outputs info along with…☆12Feb 14, 2018Updated 8 years ago
- Example orchestration with CAC☆11Jan 15, 2026Updated last month
- WordPress Optimization Solutions☆10Mar 13, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A repo for cheatsheets for Aberystwyth computer science☆14Jan 29, 2020Updated 6 years ago