Tool for MSSQL relay audit and abuse
☆58Dec 17, 2024Updated last year
Alternatives and similar repositories for mssqlrelay
Users that are interested in mssqlrelay are comparing it to the libraries listed below
Sorting:
- ☆26Nov 8, 2024Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆137Jan 22, 2025Updated last year
- ☆159Feb 8, 2025Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- ☆53Oct 10, 2023Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆287Aug 18, 2021Updated 4 years ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 9 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆40Oct 8, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆143Mar 9, 2024Updated last year
- ☆110Feb 13, 2024Updated 2 years ago
- ☆26Aug 5, 2025Updated 6 months ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- ☆94May 26, 2023Updated 2 years ago
- Local SYSTEM auth trigger for relaying☆169Jul 22, 2025Updated 7 months ago
- ☆64May 31, 2024Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆368Dec 23, 2025Updated 2 months ago
- ☆168Feb 29, 2024Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- ☆44Oct 16, 2023Updated 2 years ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆386Sep 26, 2025Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆155Nov 2, 2025Updated 3 months ago
- Bash and ZSH integration for Impacket☆73Nov 6, 2025Updated 3 months ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 5 months ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- Automatically run and populate a new instance of BH CE☆115Jan 30, 2026Updated last month
- ☆38Jan 13, 2023Updated 3 years ago
- ☆198Mar 28, 2025Updated 11 months ago
- Fileless atexec, no more need for port 445☆404Mar 28, 2024Updated last year
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago