0x0FB0 / pulsar
Network footprint scanner platform. Discover domains and run your custom checks periodically.
☆403Updated 2 years ago
Alternatives and similar repositories for pulsar:
Users that are interested in pulsar are comparing it to the libraries listed below
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Updated 3 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆750Updated last year
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆361Updated 11 months ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆271Updated 4 months ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆531Updated 2 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆411Updated last year
- A wrapper for Nmap to quickly run network scans☆146Updated 4 years ago
- Linux post exploitation privilege escalation enumeration☆255Updated 4 years ago
- Fast directory scanning and scraping tool☆620Updated 10 months ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆333Updated 3 years ago
- Reverse Shell Cheat Sheet TooL☆292Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 3 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆245Updated 3 years ago
- Network Pivoting Toolkit☆438Updated last year
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆417Updated 5 months ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 4 years ago
- Python automation of Docker.sock abuse☆210Updated 2 years ago
- Search gtfobins and lolbas files from your terminal☆456Updated 2 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Freedom Fighting Mode: open source hacking harness☆337Updated 10 months ago
- Take a list of domains/subdomains and probe for working http/https server.☆186Updated 4 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆322Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆397Updated 3 years ago
- Easy files and payloads delivery over DNS☆419Updated 9 months ago
- A tool to hunt for credentials in github wild AKA git*hunt☆293Updated 2 years ago
- ☆333Updated 2 years ago