{"id":12977,"date":"2021-05-25T19:38:23","date_gmt":"2021-05-25T14:08:23","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=12977"},"modified":"2021-05-25T19:38:23","modified_gmt":"2021-05-25T14:08:23","slug":"lucifer","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/lucifer\/","title":{"rendered":"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks"},"content":{"rendered":"\n<p><strong>Lucifer <\/strong>is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More\u2026 Use Or Build Automation Modules To Speed Up Your Cyber Security Life<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/Skiller9090\/Lucifer.git<br>cd Lucifer<br>pip install -r requirements.txt<br>python main.py &#8211;help<\/strong><\/p>\n\n\n\n<p>If you want the cutting edge changes add&nbsp;<code><strong>-b dev<\/strong><\/code>&nbsp;to the end of&nbsp;<code><strong>git clone https:\/\/github.com\/Skiller9090\/Lucifer.git<\/strong><\/code><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Commands<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Command<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>help<\/td><td>Displays This Menu<\/td><\/tr><tr><td>name<\/td><td>Shows name of current shell<\/td><\/tr><tr><td>id<\/td><td>Displays current shell&#8217;s id<\/td><\/tr><tr><td>show<\/td><td>Shows options or modules based on input, EX: show &lt;options\/modules&gt;<\/td><\/tr><tr><td>options<\/td><td>Shows a list of variable\/options already set<\/td><\/tr><tr><td>set<\/td><td>Sets a variable or option, EX: set<\/td><\/tr><tr><td>set_vars<\/td><td>Auto sets need variables for loaded module<\/td><\/tr><tr><td>description<\/td><td>Displays description of the module loaded<\/td><\/tr><tr><td>auto_vars<\/td><td>Displays is auto_vars is True or False for current shell<\/td><\/tr><tr><td>change_auto_vars<\/td><td>Changes the auto_var options for one shell, all shells or future shells<\/td><\/tr><tr><td>reindex<\/td><td>Re-indexes all modules, allows for dynamic additions of modules<\/td><\/tr><tr><td>use<\/td><td>Move into a module, EX: use<\/td><\/tr><tr><td>run<\/td><td>Runs the current module, can also use exploit to do the same<\/td><\/tr><tr><td>spawn_shell<\/td><td>Spawns a alternative shell<\/td><\/tr><tr><td>open_shell<\/td><td>Open a shell by id EX: open_shell<\/td><\/tr><tr><td>show_shells<\/td><td>Show all shell ids and attached name<\/td><\/tr><tr><td>set_name<\/td><td>Sets current shells name EX: set_name<\/td><\/tr><tr><td>set_name_id<\/td><td>Set a shells name by id EX: set_name_id<\/td><\/tr><tr><td>clear<\/td><td>Clear screen<\/td><\/tr><tr><td>close<\/td><td>Kills current input into opened shell<\/td><\/tr><tr><td>reset<\/td><td>Resets Everything<\/td><\/tr><tr><td>exit<\/td><td>Exits the program, can also use quit to do the same<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Command Use<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>No-Arg Commands<ul><li><code><strong>help<\/strong><\/code>&nbsp;&#8211; to display help menu<\/li><li><code><strong>name<\/strong><\/code>&nbsp;&#8211; shows name of current shell<\/li><li><code><strong>id<\/strong><\/code>&nbsp;&#8211; shows current shell id<\/li><li><code><strong>options<\/strong><\/code>&nbsp;&#8211; shows a table of set options\/vars<\/li><li><code><strong>set_vars<\/strong><\/code>&nbsp;&#8211; automatically sets vars needed for the loaded module (default defined in a module)<\/li><li><code><strong>description<\/strong><\/code>&nbsp;&#8211; show description of current loaded module<\/li><li><code><strong>auto_vars<\/strong><\/code>&nbsp;&#8211; displays current setting of auto_vars (auto_vars if true will automatically run set_vars on module load)<\/li><li><strong><code>run<\/code>&nbsp;<\/strong>&#8211; runs the module with the current options,&nbsp;<code>exploit<\/code>&nbsp;works the same<\/li><li><code><strong>spawn_shell<\/strong><\/code>&nbsp;&#8211; spawns a new Shell instance<\/li><li><code><strong>show_shells<\/strong><\/code>&nbsp;&#8211; shows all open shells ids and names<\/li><li><code><strong>clear<\/strong><\/code>&nbsp;&#8211; clears the terminal\/console screen<\/li><li><strong><code>close<\/code>&nbsp;<\/strong>&#8211; kills the input to current shell<\/li><li><code><strong>reset<\/strong><\/code>&nbsp;&#8211; resets everything (not implemented)<\/li><li><strong><code>exit<\/code>&nbsp;<\/strong>&#8211; quits the program<\/li><\/ul><\/li><li><a href=\"https:\/\/github.com\/Skiller9090\/Lucifer#arg-commands\"><\/a>Arg Commands<ul><li><code><strong>show &lt;options\/modules&gt;<\/strong><\/code>&nbsp;&#8211; displays a list of set options or modules depending on argument.<\/li><li><code><strong>set &lt;var_name&gt; &lt;value&gt;<\/strong><\/code>&nbsp;&#8211; sets a variable\/option<\/li><li><code><strong>change_auto_vars &lt;to_set&gt; &lt;args&gt;<\/strong><\/code>:<ul><li><code><strong>&lt;to_set&gt;<\/strong><\/code>&nbsp;&#8211; can be true or false (t or f) (-t or -f)<\/li><li><code><strong>&lt;args&gt;<\/strong><\/code>:<ul><li><code><strong>-g<\/strong><\/code>&nbsp;= global &#8211; sets for all shells spawned<\/li><li><code><strong>-n<\/strong><\/code>&nbsp;= new &#8211; sets this option for future shell spawns<\/li><li><code><strong>-i<\/strong><\/code>&nbsp;= inclusive &#8211; no matter what, set current shell to &lt;to_set&gt;<\/li><\/ul><\/li><\/ul><\/li><li><code><strong>use &lt;module&gt; &lt;args&gt;<\/strong><\/code>:<ul><li><code><strong>&lt;module&gt;<\/strong><\/code>&nbsp;&#8211; path to module<\/li><li><code><strong>&lt;args&gt;<\/strong><\/code>:<ul><li><code><strong>-R<\/strong><\/code>&nbsp;&#8211; Override cache (reload dynamically)<\/li><\/ul><\/li><\/ul><\/li><li><code><strong>open_shell &lt;id&gt;<\/strong><\/code>&nbsp;&#8211; opens a shell by its id<\/li><li><code><strong>set_name &lt;name&gt;<\/strong><\/code>&nbsp;&#8211; set the name of the current shell<\/li><li><code><strong>set_name_id &lt;id&gt; &lt;name&gt;<\/strong><\/code>&nbsp;&#8211; set the name of the shell specified by<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Using Java<\/strong><\/p>\n\n\n\n<p>Lucifer allows for Python and Java code to work side by side through the use of LMI.Java extension. For this to work you will need to install jpype1, to do this run the following command in your python environment:<br><code><strong>pip install jpype1<\/strong><\/code><br>From here you are free to interact with LMI.Java.compiler and LMI.Java.luciferJVM which allows you to call java functions and instantiate java classes through python, more documentation of this will be created later on, on the lucifer wiki.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Examples<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Settings Variables<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-snahb8Gtj-A\/YKOAl8V4WRI\/AAAAAAAAJIE\/QR_Ey6LGlN0_hH1nAd22nQMsP8tTXbNjgCLcBGAsYHQ\/s1916\/1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Running Module<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-4-i-hOmZ_zc\/YKOA-6rIHTI\/AAAAAAAAJIM\/c2k1BvmrsXkkLuwcX2-7cCRhYESERlkMACLcBGAsYHQ\/s1920\/2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Settings<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-zxsli08IEWs\/YKOBTFOn0HI\/AAAAAAAAJIU\/ANRdFTPPMGkdR-KFpl3B3vsFjHPdJYJMQCLcBGAsYHQ\/s572\/3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Versioning<\/strong><\/p>\n\n\n\n<p>The standard of versioning on this project is:<\/p>\n\n\n\n<p>MAJOR.MINOR.PATCH.STAGE.BUILD<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Major:<\/strong><ul><li>Incremented when either there has been a significant amount of new features since the start of the major or if there is a change which is so big that is can cause compatibility issues (Major of 0 if very unstable<\/li><li>Could cause incompatibility issues<\/li><\/ul><\/li><li><strong><a href=\"https:\/\/github.com\/Skiller9090\/Lucifer#minor\"><\/a>Minor:<\/strong><ul><li>Incremented when a new feature or feature-set is added to the project<\/li><li>Should not cause incompatibility errors due to only additions made<\/li><\/ul><\/li><li><strong><a href=\"https:\/\/github.com\/Skiller9090\/Lucifer#patch\"><\/a>Patch:<\/strong><ul><li>Incremented on bugfixes or if feature is so small that it is worth incrementing minor<\/li><li>Very low risk of incompatibility error<\/li><\/ul><\/li><li><strong><a href=\"https:\/\/github.com\/Skiller9090\/Lucifer#stage\"><\/a>Stage:<\/strong><ul><li>The stage of current MAJOR.MINOR.PATCH BUILD, either alpha, beta, release candidate or release<\/li><li>Indicates how far through development the new MAJOR.MINOR.PATCH is<\/li><li>Stage number to name translation:<ul><li>0 =&gt; beta (b)<\/li><li>1 =&gt; alpha (a)<\/li><li>2 =&gt; release candidate (rc)<\/li><li>3 =&gt; release (r)<\/li><\/ul><\/li><\/ul><\/li><li><a href=\"https:\/\/github.com\/Skiller9090\/Lucifer#build\"><\/a>Build:<ul><li>This should be incremented on every change made to the code, even on a one character change<\/li><\/ul><\/li><li>This version structure can be stored and displayed in a few ways:<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>The best way to store the data within code is via a tuple such as:<ul><li>(Major, Minor, Patch, Stage, Build)<ul><li>Example is: (1, 4, 1, 2, 331)<\/li><\/ul><\/li><\/ul><\/li><li>The long display would be:<ul><li><code><strong>{stage} {major}.{minor}.{patch} Build {build}<\/strong><\/code><ul><li>Example is: Alpha 1.4.1 Build 331<\/li><\/ul><\/li><\/ul><\/li><li>The short display would be:<ul><li><code><strong>{major}.{minor}.{patch}{stage}{build}<\/strong><\/code><ul><li>Example is: 1.4.1a331<\/li><\/ul><\/li><\/ul><\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/Skiller9090\/Lucifer\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More\u2026 Use Or Build Automation Modules To Speed Up Your Cyber Security Life git clone https:\/\/github.com\/Skiller9090\/Lucifer.gitcd Luciferpip install -r requirements.txtpython main.py &#8211;help If you want the cutting edge changes add&nbsp;-b dev&nbsp;to the end of&nbsp;git clone https:\/\/github.com\/Skiller9090\/Lucifer.git Commands [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","fifu_image_alt":"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1065,1072,1112,1929,1952,2571],"class_list":["post-12977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-enumeration","tag-escalation","tag-exfilitration","tag-local-privilege","tag-lucifer","tag-power-penetration"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks<\/title>\n<meta name=\"description\" content=\"Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/lucifer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks\" \/>\n<meta property=\"og:description\" content=\"Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/lucifer\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-25T14:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks\",\"datePublished\":\"2021-05-25T14:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png\",\"keywords\":[\"Enumeration\",\"Escalation\",\"exfilitration\",\"local privilege\",\"lucifer\",\"power penetration\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/\",\"name\":\"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png\",\"datePublished\":\"2021-05-25T14:08:23+00:00\",\"description\":\"Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/lucifer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks","description":"Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/lucifer\/","og_locale":"en_US","og_type":"article","og_title":"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks","og_description":"Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More.","og_url":"https:\/\/kalilinuxtutorials.com\/lucifer\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-05-25T14:08:23+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks","datePublished":"2021-05-25T14:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/"},"wordCount":810,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","keywords":["Enumeration","Escalation","exfilitration","local privilege","lucifer","power penetration"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/","url":"https:\/\/kalilinuxtutorials.com\/lucifer\/","name":"Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","datePublished":"2021-05-25T14:08:23+00:00","description":"Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration And More.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/lucifer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/lucifer\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-BylGO00Zp_o\/YKVhRxnZUrI\/AAAAAAAAJJc\/hwn4lu3npUEYrUaxyY7NC_0c6DhZ8Zp3QCLcBGAsYHQ\/s728\/Lucifer%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4123,"url":"https:\/\/kalilinuxtutorials.com\/legion-penetration-testing\/","url_meta":{"origin":12977,"position":0},"title":"Legion : An Open Source, Easy-To-Use, Super-extensible &#038; Semi-Automated Network Penetration Testing Tool","author":"R K","date":"March 10, 2019","format":false,"excerpt":"Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. FEATURES Automatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and more (with almost 100 auto-scheduled scripts)Easy\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2571,"url":"https:\/\/kalilinuxtutorials.com\/sqlmap-v1-2-9-automatic-injection\/","url_meta":{"origin":12977,"position":1},"title":"SQLMap v1.2.9 &#8211; Automatic SQL Injection &#038; Database Takeover Tool","author":"R K","date":"September 12, 2018","format":false,"excerpt":"SQLMap\u00a0v1.2.9 is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/SQl.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/SQl.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/SQl.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/SQl.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":37081,"url":"https:\/\/kalilinuxtutorials.com\/oscp\/","url_meta":{"origin":12977,"position":2},"title":"OSCP : Navigating The Essential Toolkit For Penetration Testing","author":"Varshini","date":"March 14, 2025","format":false,"excerpt":"The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration testing skills. To achieve this certification, candidates must demonstrate proficiency in using various tools and techniques to identify vulnerabilities and exploit them. Here's an overview of some key tools and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6786,"url":"https:\/\/kalilinuxtutorials.com\/lockdoor-framework-penetration-testing-framework-cyber-security\/","url_meta":{"origin":12977,"position":3},"title":"Lockdoor Framework : A Penetration Testing Framework with Cyber Security Resources","author":"R K","date":"October 5, 2019","format":false,"excerpt":"LockDoor\u00a0is a Framework aimed at\u00a0helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian\/Ubuntu\/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35006,"url":"https:\/\/kalilinuxtutorials.com\/nullinux\/","url_meta":{"origin":12977,"position":4},"title":"Nullinux &#8211; The Comprehensive SMB Enumeration Tool For Penetration Testing","author":"Varshini","date":"September 30, 2024","format":false,"excerpt":"Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB. If no username and password are provided in the command line arguments, an anonymous login, or null session, is attempted. Nullinux acts as a wrapper\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOMjFd_5aAjG7kn-wptDc67hWbuJMERrqCmVHNrfKuogBMpc2B4zQtNkTp-COm-XJ4MK610KcNcKxvcbn3gOmhRV6FkiC9dk5yk5tJhxHX9fGeG-rNEvcznqjRF3ypcmXgF0G261KJPPJQC7LABffcq48xvXuZTLyuLF0fTvItQrhEKXFgM2jdRIJT0eCK\/s1600\/Nullinux%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOMjFd_5aAjG7kn-wptDc67hWbuJMERrqCmVHNrfKuogBMpc2B4zQtNkTp-COm-XJ4MK610KcNcKxvcbn3gOmhRV6FkiC9dk5yk5tJhxHX9fGeG-rNEvcznqjRF3ypcmXgF0G261KJPPJQC7LABffcq48xvXuZTLyuLF0fTvItQrhEKXFgM2jdRIJT0eCK\/s1600\/Nullinux%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOMjFd_5aAjG7kn-wptDc67hWbuJMERrqCmVHNrfKuogBMpc2B4zQtNkTp-COm-XJ4MK610KcNcKxvcbn3gOmhRV6FkiC9dk5yk5tJhxHX9fGeG-rNEvcznqjRF3ypcmXgF0G261KJPPJQC7LABffcq48xvXuZTLyuLF0fTvItQrhEKXFgM2jdRIJT0eCK\/s1600\/Nullinux%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOMjFd_5aAjG7kn-wptDc67hWbuJMERrqCmVHNrfKuogBMpc2B4zQtNkTp-COm-XJ4MK610KcNcKxvcbn3gOmhRV6FkiC9dk5yk5tJhxHX9fGeG-rNEvcznqjRF3ypcmXgF0G261KJPPJQC7LABffcq48xvXuZTLyuLF0fTvItQrhEKXFgM2jdRIJT0eCK\/s1600\/Nullinux%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOMjFd_5aAjG7kn-wptDc67hWbuJMERrqCmVHNrfKuogBMpc2B4zQtNkTp-COm-XJ4MK610KcNcKxvcbn3gOmhRV6FkiC9dk5yk5tJhxHX9fGeG-rNEvcznqjRF3ypcmXgF0G261KJPPJQC7LABffcq48xvXuZTLyuLF0fTvItQrhEKXFgM2jdRIJT0eCK\/s1600\/Nullinux%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOMjFd_5aAjG7kn-wptDc67hWbuJMERrqCmVHNrfKuogBMpc2B4zQtNkTp-COm-XJ4MK610KcNcKxvcbn3gOmhRV6FkiC9dk5yk5tJhxHX9fGeG-rNEvcznqjRF3ypcmXgF0G261KJPPJQC7LABffcq48xvXuZTLyuLF0fTvItQrhEKXFgM2jdRIJT0eCK\/s1600\/Nullinux%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":12977,"position":5},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12977"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16833"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}