jacopodl / Pulsar
Data exfiltration and covert communication tool
☆38Updated 2 years ago
Alternatives and similar repositories for Pulsar:
Users that are interested in Pulsar are comparing it to the libraries listed below
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- C# User Simulation☆32Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- pypykatz plugin for volatility3 framework☆39Updated 11 months ago
- ☆44Updated last year
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- Continuous kerberoast monitor☆44Updated last year
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last month
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- ☆24Updated 2 years ago
- ProcDot Malware Sandbox☆22Updated 4 months ago
- ☆34Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- ☆31Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- various slides and presentations I've worked on☆18Updated 2 weeks ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Forked and updated with some additional features over the original☆16Updated 4 years ago
- wordlists for password cracking☆27Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago