Skiller9090 / LuciferLinks
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
☆376Updated 2 years ago
Alternatives and similar repositories for Lucifer
Users that are interested in Lucifer are comparing it to the libraries listed below
Sorting:
- fully automated pentesting tool☆516Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆405Updated last month
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆448Updated 9 months ago
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆229Updated 3 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆407Updated 2 years ago
- Fast Modular Web Interfaces Bruteforcer☆228Updated 3 years ago
- ☆414Updated 2 years ago
- Metasploit Cheat Sheet 💣☆455Updated 5 years ago
- Perform automated network reconnaissance scans☆237Updated 2 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆610Updated 5 months ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆210Updated last year
- 🔺 Red Team Hardware Toolkit 🔺☆341Updated 5 years ago
- GUI based offensive penetration testing tool (Open Source)☆219Updated 3 months ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆167Updated 4 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆288Updated 4 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆461Updated 2 years ago
- Automated brute-forcing attack tool.☆412Updated 4 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆292Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆498Updated last year
- Single Page Cheatsheet for common MSF Venom One Liners☆284Updated 6 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆255Updated 3 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆396Updated 4 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆200Updated 4 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆415Updated 2 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆374Updated last year
- Red Team PowerShell Script☆335Updated 2 years ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆568Updated 4 months ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆638Updated 2 months ago
- A backdoor with a multitude of features.☆288Updated last year
- Python script wrote to automate the process of generating various reverse shells.☆201Updated 4 years ago