Windows Application Attack Surface Analyzer
☆24Feb 22, 2024Updated 2 years ago
Alternatives and similar repositories for waasa
Users that are interested in waasa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- ☆18Mar 26, 2025Updated last year
- Checks if out-of-bailiwick hostnames of a zone are resolvable☆18Dec 19, 2022Updated 3 years ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ProxyWatch☆48Apr 3, 2026Updated last week
- ☆18Feb 29, 2024Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- Container Security Verification Standard☆35Mar 28, 2019Updated 7 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 5 months ago
- Self Delete DLL☆22Feb 15, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 2 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 9 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆58Oct 9, 2024Updated last year
- ☆41Feb 20, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 2 months ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- ☆38Mar 28, 2025Updated last year
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- ☆27Jan 16, 2026Updated 2 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 4 months ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆159Nov 28, 2025Updated 4 months ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 9 months ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆49Nov 9, 2025Updated 5 months ago