jacopodl / Pulsar
Data exfiltration and covert communication tool
☆37Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Pulsar
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆57Updated 6 years ago
- Continuous kerberoast monitor☆44Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- C# User Simulation☆33Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆37Updated 4 months ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated 9 months ago
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- pypykatz plugin for volatility3 framework☆31Updated 7 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- various slides and presentations I've worked on☆18Updated 9 months ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆44Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆19Updated last year
- ☆9Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- A rogue DNS detector☆23Updated last year
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago