dobin / waasaLinks
Windows Application Attack Surface Analyzer
☆18Updated last year
Alternatives and similar repositories for waasa
Users that are interested in waasa are comparing it to the libraries listed below
Sorting:
- ☆21Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆56Updated 2 years ago
- SMB Audit Tool you were looking for☆21Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆42Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- Ansible role that Installs Mythic☆15Updated 11 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Scripts to interact with Microsoft Graph APIs☆40Updated 6 months ago
- terraform deployment for red team☆22Updated 2 years ago
- Find Inbound Email Domains☆24Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- ☆14Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆18Updated 11 months ago
- ☆10Updated last year
- Repository for LNK stuff☆30Updated 2 years ago
- ☆23Updated 3 years ago
- Payload Generation Framework☆9Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- ☆14Updated last year
- ☆31Updated this week
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 3 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Dump LSASS process in Task Manager without triggering Defender.☆18Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago