All Projects → Lucifer → Similar Projects or Alternatives

1206 Open source projects that are alternatives of or similar to Lucifer

Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+360.93%)
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (-70.53%)
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-79.8%)
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-87.42%)
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+124.17%)
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+2299.34%)
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+26.49%)
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-90.4%)
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-72.19%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+188.08%)
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+665.56%)
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-66.56%)
Mutual labels:  cybersecurity, cyber-security
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-85.1%)
Mutual labels:  cybersecurity, hacking-tool
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (-70.2%)
Mutual labels:  cybersecurity, hacking-tool
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-94.04%)
Mutual labels:  cybersecurity, cyber-security
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-71.19%)
Mutual labels:  cybersecurity, cyber-security
trj
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-93.05%)
Mutual labels:  cybersecurity, hacking-tool
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-80.46%)
Mutual labels:  cybersecurity, hacking-tool
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-84.11%)
Mutual labels:  cybersecurity, cyber-security
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-94.7%)
Mutual labels:  cybersecurity, cyber-security
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1808.28%)
Mutual labels:  cybersecurity, cyber-security
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+79.14%)
Mutual labels:  cybersecurity, pentest-tool
Crosslinked
LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Stars: ✭ 223 (-26.16%)
Mutual labels:  enumeration, pentest-tool
Webspoilt
This script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-88.74%)
Mutual labels:  cybersecurity, hacking-tool
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+100%)
Mutual labels:  cybersecurity, hacking-tool
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+218.21%)
Mutual labels:  cybersecurity, pentest-tool
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-4.97%)
Mutual labels:  cybersecurity, pentest-tool
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (-43.05%)
Mutual labels:  cybersecurity, pentest-tool
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+2295.36%)
Mutual labels:  cybersecurity, cyber-security
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-49.34%)
Mutual labels:  cybersecurity, cyber-security
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (-44.04%)
Mutual labels:  cybersecurity, cyber-security
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+810.6%)
Mutual labels:  cybersecurity, pentest-tool
Jdk9 Jigsaw
Examples and exercises based on some of the features of jigsaw in JDK9/Jigsaw (Early Access builds)
Stars: ✭ 275 (-8.94%)
Mutual labels:  modular, modules
Behold3r
👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-90.4%)
Mutual labels:  cybersecurity, pentest-tool
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-75.17%)
Mutual labels:  cybersecurity, hacking-tool
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-87.42%)
Mutual labels:  cybersecurity, cyber-security
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-91.72%)
Mutual labels:  cybersecurity, cybersec
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-88.08%)
Mutual labels:  cybersecurity, cyber-security
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+54.3%)
Mutual labels:  cybersecurity, hacking-tool
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+1521.52%)
Mutual labels:  cybersecurity, pentest-tool
L5modular
Generates and handles Modules for Laravel
Stars: ✭ 188 (-37.75%)
Mutual labels:  modular, modules
Pext
Python-based extendable tool
Stars: ✭ 380 (+25.83%)
Mutual labels:  modular, modules
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-53.64%)
Mutual labels:  cybersecurity, cyber-security
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-84.44%)
Mutual labels:  cybersecurity, hacking-tool
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-45.03%)
Mutual labels:  cybersecurity, pentest-tool
Powershell Red Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (-48.68%)
Mutual labels:  cybersecurity, enumeration
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-16.56%)
Mutual labels:  cybersecurity, enumeration
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-59.93%)
Mutual labels:  cybersecurity, pentest-tool
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (-58.94%)
Mutual labels:  cybersecurity, cyber-security
Mastering Modular Javascript
📦 Module thinking, principles, design patterns and best practices.
Stars: ✭ 3,972 (+1215.23%)
Mutual labels:  modular, modules
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-67.88%)
Mutual labels:  cybersecurity, hacking-tool
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (-6.95%)
Mutual labels:  cybersecurity, exfiltration
slopShell
the only php webshell you need.
Stars: ✭ 208 (-31.13%)
Mutual labels:  modular, hacking-tool
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (-72.52%)
Mutual labels:  cybersecurity, cyber-security
vimana-framework
Vimana is an experimental security framework that aims to provide resources for auditing Python web applications.
Stars: ✭ 47 (-84.44%)
Mutual labels:  hacking-tool, hacking-framework
StartupModules
Startup modules for ASP.NET Core.
Stars: ✭ 33 (-89.07%)
Mutual labels:  modular, modules
CodeIgniter-HMVC
CodeIgniter 3.1.10 with Modular Extensions - HMVC and Whoops Error Handling Framework 2.5.0
Stars: ✭ 30 (-90.07%)
Mutual labels:  modular, modules
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (-59.93%)
Mutual labels:  cybersecurity, pentest-tool
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-39.74%)
Mutual labels:  enumeration, hacking-tool
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-83.11%)
Mutual labels:  cybersecurity, hacking-tool
1-60 of 1206 similar projects