Skiller9090 / LuciferView external linksLinks
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
☆376Nov 8, 2022Updated 3 years ago
Alternatives and similar repositories for Lucifer
Users that are interested in Lucifer are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Oct 17, 2025Updated 3 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Jul 6, 2024Updated last year
- Wi-Fi Exploit Tool☆51May 23, 2020Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆138Oct 3, 2023Updated 2 years ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆685Jul 15, 2024Updated last year
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- A polyglot payload generator☆242Aug 15, 2022Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆705Oct 29, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Sep 25, 2020Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Jan 19, 2026Updated 3 weeks ago
- Self-developed tools for Lateral Movement/Code Execution☆720Aug 17, 2021Updated 4 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆214Jan 16, 2022Updated 4 years ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆525Mar 1, 2024Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆228Sep 24, 2021Updated 4 years ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,527Jun 4, 2025Updated 8 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Aug 18, 2025Updated 5 months ago
- Hide your payload in DNS☆617May 3, 2023Updated 2 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- Python AV Evasion Tools☆521Oct 14, 2025Updated 3 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Run Powershell without software restrictions.☆282Sep 8, 2021Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆415Sep 8, 2025Updated 5 months ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 5 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆296May 15, 2024Updated last year
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago