NetSPI / ESCLinks
Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it was originally designed for targeting SQL Servers during penetration tests and red team engagements. The intent of the project is to provide an .exe, b…
☆299Updated 2 years ago
Alternatives and similar repositories for ESC
Users that are interested in ESC are comparing it to the libraries listed below
Sorting:
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆369Updated 5 years ago
- ☆364Updated 4 years ago
- Enumerate Domain Data☆335Updated 2 years ago
- Run Rubeus via Rundll32☆204Updated 5 years ago
- .NET Project for performing Authenticated Remote Execution☆406Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- DAFT: Database Audit Framework & Toolkit☆181Updated 4 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆368Updated 3 months ago
- scan for NTLM directories☆376Updated 4 months ago
- ☆249Updated 2 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Updated 3 years ago
- ☆408Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆249Updated 5 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆479Updated 3 years ago
- ADCS abuser☆305Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆219Updated 5 years ago
- A User Impersonation tool - via Token or Shellcode injection☆421Updated 3 years ago
- Collection of C# projects. Useful for pentesting and redteaming.☆319Updated 2 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆318Updated 2 years ago
- Collection of cyphers for bloodhound☆155Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆236Updated 2 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆233Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆330Updated 6 years ago
- Retrieve LAPS password from LDAP☆431Updated 4 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆298Updated 5 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆331Updated 3 years ago
- Bypass for PowerShell Constrained Language Mode☆402Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆443Updated 3 years ago