LordCatatonic / LuciferLinks
Python botnet
☆12Updated 10 years ago
Alternatives and similar repositories for Lucifer
Users that are interested in Lucifer are comparing it to the libraries listed below
Sorting:
- Lucifer is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python.☆25Updated 3 years ago
- HTTP botnet☆63Updated 9 years ago
- Metasploit things, modules, plugins, exploits☆26Updated 11 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆22Updated 11 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 9 years ago
- Small backdoor using cookie.☆63Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- Proxy scraper for proxychains☆43Updated 5 years ago
- Simple Karma Attack☆68Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Updated 7 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆30Updated 8 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- A simple python reverse shell written just for fun.☆62Updated 3 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- MS17-010☆12Updated 8 years ago
- An Raspberry PI 2 OpenWRT Image Setup To Be A Wireless Hacking Sandbox☆39Updated 10 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated last month
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 5 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Updated 4 years ago