dobin / waasaLinks
Windows Application Attack Surface Analyzer
☆23Updated last year
Alternatives and similar repositories for waasa
Users that are interested in waasa are comparing it to the libraries listed below
Sorting:
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Living Off the Foreign Land setup scripts☆74Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Updated 9 months ago
- SMB Audit Tool you were looking for☆23Updated 2 years ago
- ☆44Updated last year
- ☆86Updated 3 years ago
- POC tool to abuse windows server failover clusters☆49Updated 5 months ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 5 months ago
- ☆70Updated 2 years ago
- Find Inbound Email Domains☆35Updated 2 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆49Updated 4 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆14Updated last year
- ☆74Updated 6 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- terraform deployment for red team☆26Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆59Updated 5 months ago
- ☆42Updated 7 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 5 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 5 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 9 months ago