RikunjSindhwad / MSSQL-Attacker
MSSQL Database Attacker tool
☆190Updated 2 years ago
Alternatives and similar repositories for MSSQL-Attacker:
Users that are interested in MSSQL-Attacker are comparing it to the libraries listed below
- DCSync Attack from Outside using Impacket☆112Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆180Updated 3 years ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆81Updated 3 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆125Updated last year
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- Dumping LSASS with a duplicated handle from custom LSA plugin☆199Updated 2 years ago
- ☆220Updated 9 months ago
- Fileless atexec, no more need for port 445☆354Updated 10 months ago
- Beacon Object File PoC implementation of KillDefender☆218Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆166Updated 3 months ago
- Perform DCSync operation without mimikatz☆142Updated 3 months ago
- ADCS cert template modification and ACL enumeration☆132Updated last year
- MS-FSRVP coercion abuse PoC☆282Updated 3 years ago
- An all-in-one Cobalt Strike BOF to patch, check and revert AMSI and ETW for x64 process. Both syscalls and dynamic resolve versions are a…☆127Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- Active Directory password spraying tool. Auto fetches user list and avoids potential lockouts.☆127Updated 3 years ago
- AV/EDR evasion via direct system calls.☆107Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆106Updated last year
- PoC to coerce authentication from Windows hosts using MS-WSP☆229Updated last year
- Pass the Hash to a named pipe for token Impersonation☆299Updated last year
- ☆95Updated last year
- Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207☆108Updated last year
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆323Updated 2 years ago
- ☆214Updated 11 months ago
- ☆79Updated last year
- Simple C# implementation of PowerUpSQL☆94Updated 7 months ago
- Useful Cobalt Strike BOFs found or used during engagements☆136Updated last year
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Shellcode launcher for AV bypass☆217Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago