Windows Application Attack Surface Analyzer
☆25Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for waasa
Users that are interested in waasa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 11 months ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- ☆18Mar 26, 2025Updated last year
- Checks if out-of-bailiwick hostnames of a zone are resolvable☆18Apr 30, 2026Updated 3 weeks ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ProxyWatch☆50Apr 25, 2026Updated 3 weeks ago
- ☆18Feb 29, 2024Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- μBlaze Architecture Plugin for Binary Ninja☆11May 29, 2022Updated 3 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 6 months ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Certificate Export Utility☆26May 1, 2020Updated 6 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- OWASP Foundation Web Respository☆11Apr 16, 2026Updated last month
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- An Arduino sketch for the Adafruit SCD4X and SCD-30 CO2 sensor running on an ESP32 with an http server.☆19May 31, 2025Updated 11 months ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- A PoC for achieving persistence via push notifications on Windows☆49Jun 9, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Indirect syscalls + DInvoke made simple.☆97Dec 24, 2024Updated last year
- ☆88Feb 3, 2022Updated 4 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- Adversary Emulation Framework☆131Jul 1, 2025Updated 10 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆60Oct 9, 2024Updated last year
- ☆41Feb 20, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 3 months ago
- ☆39Mar 28, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 6 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 6 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 3 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆160Nov 28, 2025Updated 5 months ago
- Convert your shellcode into an ASCII string☆129Jun 27, 2025Updated 10 months ago