NetSPI / ESC
Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it was originally designed for targeting SQL Servers during penetration tests and red team engagements. The intent of the project is to provide an .exe, b…
☆276Updated last year
Related projects: ⓘ
- .NET Project for performing Authenticated Remote Execution☆369Updated last year
- ☆341Updated 3 years ago
- ☆345Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆339Updated 3 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆461Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆681Updated 9 months ago
- Collection of remote authentication triggers in C#☆449Updated 4 months ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆733Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆318Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆412Updated 2 years ago
- ☆190Updated last year
- Asynchronous Password Spraying Tool in C# for Windows Environments☆306Updated 9 months ago
- Enumerate Domain Data☆314Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆215Updated 2 years ago
- A tool to help query AD via the LDAP protocol☆440Updated last year
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆328Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆397Updated 2 years ago
- DAFT: Database Audit Framework & Toolkit☆173Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆488Updated 2 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆208Updated 3 years ago
- Run Rubeus via Rundll32☆193Updated 4 years ago
- Bypass for PowerShell Constrained Language Mode☆359Updated 2 years ago
- A .NET Framework 4.0 Windows Agent☆443Updated 2 weeks ago
- Retrieve LAPS password from LDAP☆379Updated 3 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆312Updated 4 years ago
- Miscellaneous Tools☆262Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆244Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆221Updated 3 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆219Updated 4 years ago
- Cobalt Strike kit for Lateral Movement☆640Updated 4 years ago