HarmJ0y / PowerUpSQL
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
☆8Updated 7 years ago
Alternatives and similar repositories for PowerUpSQL:
Users that are interested in PowerUpSQL are comparing it to the libraries listed below
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Updated 7 years ago
- This repo contains Powershell scripts used for general hackery.☆8Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Scripts for OSCE☆18Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- MS17-010☆12Updated 7 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 10 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- ☆34Updated 2 months ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Software exploitation training material☆15Updated 7 years ago
- ☆15Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Miscellaneous for various things☆20Updated 4 months ago