Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization public facing assets with minimal knowledge about its infrastructure.
Along with network data visualization, it attempts to give a basic vulnerability score to find infrastructure weak points and their relation to other resources.
It can be also used as a custom vulnerability scanner for wide and uncharted scopes. This software was created with availability and openness in mind, so it is 100% free, and does not require any API keys to use its features.
What it is not?
Key Features
Installation Instructions
Note:
If you would like to use External APIs see USAGE.md
In order to use email notifications, edit EMAIL_BACKEND SETTINGS in portal/portal/settings.py before the installation or web container will need to be rebuild.
Windows
Note :
Prerequisites will be verified during installation process.
For Windows 10 Home users: Since Docker desktop cannot be installed on Windows 10 Home, please install Hyper-V manually, instructions can be found here
Installation
git clone https://github.com/FooBallZ/pulsar
PS> .\install.ps1
Note: Make sure you store generated password before further installation steps. Administrator password can be changed in Django admin console at /admin/.
Linux
sudo apt install git
Note: Prerequisites will be verified during installation process.
Installation
git clone https://github.com/FooBallZ/pulsar
./install.sh
Note: Make sure you store generated password before further installation steps. Administrator password can be changed in Django admin console at /admin/.
Contribution
Documentation
Note: Full development documentation will be available in future release.
Architecture
Pulsar is a PaaS based on docker-compose file with pre-installed requirements. Provided architecture can be easliy scaled, converted and deployed to multiple common cloud environments. Web application server is based on services such as Nginx, Gunicorn and Django Rest Framework.
Docker Container Structure
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…