JumpsecLabs / WALK_WebAssembly_Lure_Krafter
A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims at aiding with initial access during red teams and phishing exercises leveraging WASM smuggling techniques.
☆82Updated 6 months ago
Alternatives and similar repositories for WALK_WebAssembly_Lure_Krafter:
Users that are interested in WALK_WebAssembly_Lure_Krafter are comparing it to the libraries listed below
- ForsHops☆63Updated last week
- Adversary Emulation Framework☆92Updated 8 months ago
- ☆54Updated last month
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆118Updated last month
- A Python POC for CRED1 over SOCKS5☆144Updated 5 months ago
- ☆104Updated last month
- ☆78Updated 8 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆47Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆112Updated 10 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆111Updated this week
- Two in one, patch lifetime powershell console, no more etw and amsi!☆85Updated 9 months ago
- ☆49Updated 5 months ago
- Lateral Movement☆122Updated last year
- AzureAD beacon object files☆115Updated 3 months ago
- ☆109Updated 4 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Lateral Movement via the .NET Profiler☆79Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆73Updated 3 weeks ago
- Sniffing files generator☆55Updated last month
- ☆158Updated this week
- TokenCert☆94Updated 4 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆29Updated 3 weeks ago
- ☆87Updated 2 years ago
- Simple BOF to read the protection level of a process☆115Updated last year
- ☆95Updated 7 months ago
- Rusty Impersonate☆95Updated last year
- ☆106Updated 11 months ago