dobin / waasaLinks
Windows Application Attack Surface Analyzer
☆24Updated last year
Alternatives and similar repositories for waasa
Users that are interested in waasa are comparing it to the libraries listed below
Sorting:
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- POC tool to abuse windows server failover clusters☆53Updated 5 months ago
- Living Off the Foreign Land setup scripts☆74Updated 11 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆86Updated 3 years ago
- ☆21Updated 4 months ago
- ☆64Updated last week
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- SMB Audit Tool you were looking for☆24Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 9 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 5 months ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- ☆42Updated 7 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆52Updated last week
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆38Updated 2 years ago
- ☆74Updated 7 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- ☆40Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 5 months ago
- ☆22Updated 3 weeks ago
- ☆28Updated 5 years ago
- Find Inbound Email Domains☆35Updated 2 years ago
- ☆116Updated 7 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆14Updated last year
- Linux CS bypass technique☆32Updated 11 months ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆92Updated 6 months ago