Skiller9090 / LuciferLinks
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
☆372Updated 2 years ago
Alternatives and similar repositories for Lucifer
Users that are interested in Lucifer are comparing it to the libraries listed below
Sorting:
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆404Updated last year
- fully automated pentesting tool☆514Updated 2 years ago
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆227Updated 3 years ago
- Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a…☆441Updated 6 months ago
- Fast Modular Web Interfaces Bruteforcer☆227Updated 3 years ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆404Updated 2 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆590Updated 3 months ago
- ☆414Updated 2 years ago
- Perform automated network reconnaissance scans☆232Updated 2 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆462Updated last year
- Metasploit Cheat Sheet 💣☆444Updated 5 years ago
- GUI based offensive penetration testing tool (Open Source)☆217Updated last week
- Turn PuTTY into an SSH login bruteforcing tool.☆285Updated 4 years ago
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆209Updated last year
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆162Updated 4 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆332Updated 5 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆254Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆501Updated last year
- Automated brute-forcing attack tool.☆410Updated 4 years ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆165Updated 2 years ago
- Automate dorking while doing bug bounty or other stuffs.☆221Updated 3 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆197Updated 3 years ago
- Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.☆613Updated last week
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆297Updated 2 years ago
- A backdoor with a multitude of features.☆286Updated 10 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆367Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 4 years ago
- Red Team PowerShell Script☆335Updated 2 years ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆393Updated 3 years ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆565Updated last month