jacopodl / PulsarLinks
Data exfiltration and covert communication tool
☆38Updated 2 years ago
Alternatives and similar repositories for Pulsar
Users that are interested in Pulsar are comparing it to the libraries listed below
Sorting:
- Exfiltration based on custom X509 certificates☆26Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Continuous kerberoast monitor☆45Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- ☆28Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- ☆22Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- ☆15Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 6 years ago
- ProcDot Malware Sandbox☆24Updated 7 months ago
- Repository for LNK stuff☆30Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago