Data exfiltration and covert communication tool
☆39Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for Pulsar
Users that are interested in Pulsar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated list of awesome, open source data exfiltration tools☆62Oct 30, 2021Updated 4 years ago
- WhiteBeam: Transparent endpoint security☆100Mar 29, 2023Updated 2 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Mar 12, 2026Updated last week
- ☆30Jul 28, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A replacement for "kubectl exec" that works over WebSocket connections.☆43Mar 30, 2024Updated last year
- ☆30May 12, 2025Updated 10 months ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- Python code injection library☆10Jul 30, 2018Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- ☆13Aug 13, 2021Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- ☆36Nov 30, 2023Updated 2 years ago
- NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.☆32Jul 16, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A websocket proxy☆13Nov 13, 2017Updated 8 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Capture The Flag Challenge for eBPF Summit 2022☆19Oct 2, 2022Updated 3 years ago
- 10 years after the downfall of the TRiAS GmbH in Germany it's definitely time to release the sources of the TRiAS Spatial Information Sys…☆11Nov 11, 2012Updated 13 years ago
- LiteSpeed Cache Privilege Escalation PoC☆21Aug 25, 2024Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- ThinkPHP 3.2.X POC Report By 风起☆12Apr 24, 2023Updated 2 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Dumps from a collection of hotel room keys for analysis☆13Oct 19, 2020Updated 5 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- Analyses wifi probes (from mobile phones etc) and looks them up on wigle to provide possibly commonly visited locations of people near yo…☆29Jan 10, 2026Updated 2 months ago
- Hack any account sending fake nitro QR code (only for educational purpose)☆18Jan 7, 2022Updated 4 years ago
- Generates keyboard sequences according to a given layout and creates dictionary files for bruteforcing☆14Jan 29, 2014Updated 12 years ago
- windows version netcat support sha1 for file transfer checking , multithread , UDP and OTP☆17Sep 16, 2024Updated last year
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago