JumpsecLabs / WALK_WebAssembly_Lure_Krafter
A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims at aiding with initial access during red teams and phishing exercises leveraging WASM smuggling techniques.
☆68Updated 5 months ago
Alternatives and similar repositories for WALK_WebAssembly_Lure_Krafter:
Users that are interested in WALK_WebAssembly_Lure_Krafter are comparing it to the libraries listed below
- ☆93Updated 11 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆87Updated 7 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 9 months ago
- Adversary Emulation Framework☆65Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆139Updated 4 months ago
- AzureAD beacon object files☆108Updated last month
- Lateral Movement via the .NET Profiler☆79Updated 2 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆109Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Simple BOF to read the protection level of a process☆114Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆131Updated 6 months ago
- ☆107Updated 2 months ago
- Just another C2 Redirector using CloudFlare.☆85Updated 9 months ago
- Enumerate Domain Users Without Authentication☆30Updated last month
- ☆74Updated 6 months ago
- ☆122Updated 5 months ago
- TokenCert☆93Updated 3 months ago
- a port of privkit bof for havoc☆23Updated last year
- ☆99Updated 9 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆104Updated last month
- Construct the payload at runtime using an array of offsets☆61Updated 7 months ago
- Rusty Impersonate☆94Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆69Updated 3 weeks ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆22Updated last month
- Lateral Movement☆122Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆116Updated 4 months ago