Data exfiltration and covert communication tool
☆39Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Pulsar
Users that are interested in Pulsar are comparing it to the libraries listed below
Sorting:
- WhiteBeam: Transparent endpoint security☆100Mar 29, 2023Updated 2 years ago
- ☆30Jul 28, 2024Updated last year
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Capture The Flag Challenge for eBPF Summit 2022☆19Oct 2, 2022Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 9 months ago
- De-authentication attack detector that displays attack information via a React web application dashboard☆19Dec 12, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Interactive Arts 1; Installation & Immersive Environments - course repo. University of Montana, School of Media Arts☆14Aug 24, 2020Updated 5 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆217Apr 26, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- ☆27Nov 26, 2024Updated last year
- ☆23Aug 31, 2022Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- ☆36Nov 30, 2023Updated 2 years ago
- ☆33Aug 29, 2022Updated 3 years ago
- PowerShell Clipboard Data Transfer☆73Dec 29, 2025Updated 2 months ago
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 5 years ago
- Send Bulk fake poll votes with your accounts by this tool.☆12Oct 14, 2025Updated 4 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- ☆12Sep 1, 2025Updated 6 months ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 4 years ago
- ☆11Jan 14, 2021Updated 5 years ago
- Telegram forwarder☆10Jan 20, 2023Updated 3 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago