HarmJ0y / PowerUpSQL
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
☆8Updated 8 years ago
Alternatives and similar repositories for PowerUpSQL:
Users that are interested in PowerUpSQL are comparing it to the libraries listed below
- Powershell-based Windows Security Auditing Toolbox☆10Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- This repo contains Powershell scripts used for general hackery.☆8Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- ☆15Updated 2 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- ☆13Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- ☆33Updated 3 months ago
- Network Infrastructure Penetration Testing Tool☆10Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- MS17-010☆12Updated 7 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- only for 31337☆23Updated 8 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago