0x0FB0 / pulsar
Network footprint scanner platform. Discover domains and run your custom checks periodically.
☆404Updated 2 years ago
Alternatives and similar repositories for pulsar:
Users that are interested in pulsar are comparing it to the libraries listed below
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆752Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆532Updated 2 years ago
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆362Updated last year
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Updated 3 years ago
- Reverse Shell Cheat Sheet TooL☆292Updated 4 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆271Updated 5 months ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆481Updated 6 years ago
- Web app authorisation coverage scanning☆237Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 5 months ago
- A wrapper for Nmap to quickly run network scans☆146Updated 4 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆333Updated 3 years ago
- Easy files and payloads delivery over DNS☆420Updated 10 months ago
- Web-based reverse shell generator☆172Updated 3 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆245Updated 3 years ago
- a CLI for ephemeral penetration testing☆10Updated 5 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Updated 4 years ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆411Updated last year
- Rock-On is a all in one Recon tool that will just get a single entry of the Domain name and do all of the work alone.☆293Updated 5 years ago
- Network Pivoting Toolkit☆440Updated last year
- Pentest/BugBounty progress control with scanning modules☆283Updated 4 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆467Updated 5 years ago
- Take a list of domains/subdomains and probe for working http/https server.☆186Updated 4 years ago
- A tool to automate penetration tests☆381Updated 11 months ago
- Search Exploitable Software on Linux☆225Updated last year
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- ☆333Updated 2 years ago