NetSPI / ESC
Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it was originally designed for targeting SQL Servers during penetration tests and red team engagements. The intent of the project is to provide an .exe, b…
☆290Updated 2 years ago
Alternatives and similar repositories for ESC:
Users that are interested in ESC are comparing it to the libraries listed below
- ☆358Updated 4 years ago
- ☆383Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆360Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆766Updated last year
- Collection of remote authentication triggers in C#☆484Updated 11 months ago
- .NET Project for performing Authenticated Remote Execution☆393Updated 2 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆479Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Updated 2 years ago
- Run Rubeus via Rundll32☆200Updated 5 years ago
- DAFT: Database Audit Framework & Toolkit☆179Updated 3 years ago
- Enumerate Domain Data☆326Updated last year
- ☆219Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆390Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆353Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆313Updated last year
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆167Updated 2 years ago
- Find specific users in active directory via their username and logon IP address☆383Updated 5 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆401Updated last year
- A little tool to play with Outlook☆206Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆262Updated 4 years ago
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆304Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆317Updated 2 years ago
- A User Impersonation tool - via Token or Shellcode injection☆415Updated 2 years ago
- Miscellaneous Tools☆266Updated 4 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆220Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆537Updated 2 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆327Updated 5 years ago
- A tool to help query AD via the LDAP protocol☆542Updated 7 months ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆221Updated 2 years ago
- Collection of cyphers for bloodhound☆150Updated 10 months ago