NetSPI / ESC
Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it was originally designed for targeting SQL Servers during penetration tests and red team engagements. The intent of the project is to provide an .exe, b…
☆286Updated last year
Alternatives and similar repositories for ESC:
Users that are interested in ESC are comparing it to the libraries listed below
- ☆364Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆352Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆748Updated last year
- Collection of remote authentication triggers in C#☆475Updated 9 months ago
- ☆353Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆222Updated 3 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆474Updated 2 years ago
- Enumerate Domain Data☆325Updated last year
- DAFT: Database Audit Framework & Toolkit☆178Updated 3 years ago
- .NET Project for performing Authenticated Remote Execution☆389Updated 2 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆341Updated 3 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆814Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆524Updated 2 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆230Updated 2 years ago
- Python tool to Check running WebClient services on multiple targets based on @leechristensen☆268Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆411Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆381Updated 3 years ago
- PowerShell Constrained Language Mode Bypass☆258Updated 4 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆215Updated 4 years ago
- Inject remote template link into word document for remote template injection☆166Updated 4 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆216Updated last year
- A .NET Framework 4.0 Windows Agent☆464Updated last week
- MS-FSRVP coercion abuse PoC☆285Updated 3 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆322Updated 5 years ago
- ☆211Updated 2 years ago
- scan for NTLM directories☆354Updated 8 months ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆166Updated 2 years ago
- Run Rubeus via Rundll32☆198Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆418Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆399Updated last year