Data exfiltration and covert communication tool
☆39Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Pulsar
Users that are interested in Pulsar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of awesome, open source data exfiltration tools☆61Oct 30, 2021Updated 4 years ago
- WhiteBeam: Transparent endpoint security☆101Mar 29, 2023Updated 3 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆37Mar 30, 2026Updated 2 weeks ago
- ☆30Mar 23, 2026Updated 3 weeks ago
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Aug 13, 2021Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- ☆30Aug 31, 2018Updated 7 years ago
- Repository for deploy GitOps examples☆21Jul 18, 2023Updated 2 years ago
- 10 years after the downfall of the TRiAS GmbH in Germany it's definitely time to release the sources of the TRiAS Spatial Information Sys…☆11Nov 11, 2012Updated 13 years ago
- LiteSpeed Cache Privilege Escalation PoC☆21Aug 25, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 11 months ago
- A simple way to exfiltrate data using spotify API☆19Apr 6, 2026Updated last week
- ☆21Mar 4, 2021Updated 5 years ago
- Skul is a PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS).☆14Jul 12, 2018Updated 7 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆25Aug 21, 2022Updated 3 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 8 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- ☆16Mar 5, 2018Updated 8 years ago
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆14Aug 27, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Dumps from a collection of hotel room keys for analysis☆13Oct 19, 2020Updated 5 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 3 months ago
- ☆31May 22, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- ☆15Feb 12, 2019Updated 7 years ago
- 衣米魔兽项目,已开启六年的纯公益魔兽世界,基于Light's hope项目源码基础上修改和优化。网址: https://wow.ymisc.com☆19Jan 14, 2019Updated 7 years ago