0xdf-0xdf / mssqlproxyLinks
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
☆19Updated 2 years ago
Alternatives and similar repositories for mssqlproxy
Users that are interested in mssqlproxy are comparing it to the libraries listed below
Sorting:
- A Custom CLR Assembly for MSSQL of the popular tool GodPotato☆80Updated 2 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- ASPX ShellCode Loader☆54Updated last year
- More EFS coerced authentication method with PetitPotam.py☆27Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆51Updated 2 months ago
- A powershell poc to load and automatically run Certify and Rubeus from memory.☆17Updated 3 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆203Updated 3 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆182Updated 4 months ago
- DCSync Attack from Outside using Impacket☆116Updated 3 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- ☆93Updated 2 years ago
- Perform DCSync operation without mimikatz☆153Updated last year
- Silently Install Chrome Extension For Persistence☆95Updated last year
- C2 redirector base on caddy☆210Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆34Updated 5 months ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Updated 4 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆144Updated 4 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆144Updated 3 years ago
- A Combination LSASS Dumper and LSASS Parser. All Credit goes to @slyd0g and @cube0x0.☆151Updated 4 years ago
- Load shellcode via syscall☆56Updated 4 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆132Updated 4 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆89Updated 2 years ago
- Cobalt Strike BOF that Add an admin user☆78Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- ShellCodeLoader via DInvoke☆60Updated 4 years ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Updated 9 months ago
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year