A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
☆376Nov 8, 2022Updated 3 years ago
Alternatives and similar repositories for Lucifer
Users that are interested in Lucifer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆140Oct 3, 2023Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Assist reverse tcp shells in post-exploration tasks☆220Oct 17, 2025Updated 5 months ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆684Jul 15, 2024Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆167Dec 20, 2020Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- ☆54Mar 8, 2021Updated 5 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆213Jan 16, 2022Updated 4 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,533Jun 4, 2025Updated 9 months ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Aug 18, 2025Updated 7 months ago
- GUI based offensive penetration testing tool (Open Source)☆221Jul 25, 2025Updated 8 months ago
- Python AV Evasion Tools☆518Oct 14, 2025Updated 5 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆294May 15, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆704Oct 29, 2021Updated 4 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Mar 17, 2026Updated last week
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago