Windows Application Attack Surface Analyzer
☆24Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for waasa
Users that are interested in waasa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- ☆18Mar 26, 2025Updated 11 months ago
- Checks if out-of-bailiwick hostnames of a zone are resolvable☆18Dec 19, 2022Updated 3 years ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated last month
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ProxyWatch☆46Feb 28, 2026Updated 3 weeks ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- ☆18Feb 29, 2024Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- Container Security Verification Standard☆36Mar 28, 2019Updated 6 years ago
- μBlaze Architecture Plugin for Binary Ninja☆11May 29, 2022Updated 3 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- Modern terminal image library for Go☆50Mar 16, 2026Updated last week
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 2 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- An Arduino sketch for the Adafruit SCD4X and SCD-30 CO2 sensor running on an ESP32 with an http server.☆19May 31, 2025Updated 9 months ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆58Oct 9, 2024Updated last year
- ☆41Feb 20, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated last month
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- ☆38Mar 28, 2025Updated 11 months ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- ☆27Jan 16, 2026Updated 2 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago