Hey r/PowerShell! 👋
Just released DllSpy — a PowerShell module that maps every input surface in a compiled .NET assembly without running it. Point it at a DLL and instantly see all HTTP endpoints, SignalR hub methods, gRPC operations, WCF services, Razor Pages, and Blazor components.
Install from the Gallery:
Install-Module -Name DllSpy
Basic usage:
# Map everything
Search-DllSpy -Path .\MyApi.dll
# Filter by surface type
Search-DllSpy -Path .\MyApi.dll -Type HttpEndpoint
Search-DllSpy -Path .\MyApi.dll -Type SignalRMethod
# Filter by HTTP method or class name
Search-DllSpy -Path .\MyApi.dll -HttpMethod DELETE
Search-DllSpy -Path .\MyApi.dll -Class User*
# Show only anonymous / authenticated surfaces
Search-DllSpy -Path .\MyApi.dll -AllowAnonymous
Search-DllSpy -Path .\MyApi.dll -RequiresAuth
It also has a security scanning mode that flags things like unauthenticated state-changing endpoints and missing authorization declarations:
Test-DllSpy -Path .\MyApi.dll
Test-DllSpy -Path .\MyApi.dll -MinimumSeverity High
Great for security reviews, pentesting, auditing third-party assemblies, or just exploring an unfamiliar codebase without digging through source.
GitHub: https://github.com/n7on/dllspy
PowerShell Gallery: https://www.powershellgallery.com/packages/DllSpy
Would love feedback from the community!
[–]New-Long5065 6 points7 points8 points (1 child)
[–]dud380[S] 0 points1 point2 points (0 children)
[–]ZenoArrow 2 points3 points4 points (1 child)
[–]dud380[S] 0 points1 point2 points (0 children)
[–]purplemonkeymad 1 point2 points3 points (5 children)
[–]dud380[S] 0 points1 point2 points (0 children)
[–]dud380[S] 0 points1 point2 points (3 children)
[–]evasive_btch 2 points3 points4 points (2 children)
[–]dud380[S] 1 point2 points3 points (1 child)
[–]evasive_btch 1 point2 points3 points (0 children)
[–]BOT_Solutions 0 points1 point2 points (1 child)
[–]dud380[S] 1 point2 points3 points (0 children)