HarmJ0y / PowerUpSQLLinks
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
☆8Updated 8 years ago
Alternatives and similar repositories for PowerUpSQL
Users that are interested in PowerUpSQL are comparing it to the libraries listed below
Sorting:
- This repo contains Powershell scripts used for general hackery.☆8Updated 10 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- ☆15Updated 2 years ago
- ☆33Updated 5 months ago
- Red Team Tool Kit☆16Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 10 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Miscellaneous for various things☆21Updated 7 months ago
- Software exploitation training material☆15Updated 8 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- ☆18Updated last year
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- ☆13Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago