MSSQL Database Attacker tool
☆193Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for MSSQL-Attacker
Users that are interested in MSSQL-Attacker are comparing it to the libraries listed below
Sorting:
- UAC bypass for x64 Windows 7 - 11(无弹窗版)☆281Sep 5, 2022Updated 3 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆730Sep 1, 2021Updated 4 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Pass the Hash to a named pipe for token Impersonation☆311Nov 29, 2023Updated 2 years ago
- ☆180Feb 3, 2021Updated 5 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆250Mar 31, 2021Updated 4 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Mar 13, 2022Updated 3 years ago
- 域信息收集工具☆412Sep 16, 2022Updated 3 years ago
- Retrieve LAPS password from LDAP☆435Feb 17, 2021Updated 5 years ago
- Exchange 服务器安全性的辅助测试工具☆331Jul 21, 2023Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆783Oct 16, 2025Updated 4 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- CVE-2020-1472 C++☆84Sep 2, 2022Updated 3 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆344Apr 10, 2022Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆458Mar 25, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆312Jul 8, 2022Updated 3 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆817Dec 14, 2023Updated 2 years ago
- GUI alternative to the Rubeus command line tool, for all your Kerberos exploit requirements☆185Jan 9, 2022Updated 4 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆469Mar 8, 2023Updated 3 years ago
- Misc TaskScheduler Plays☆238Sep 27, 2022Updated 3 years ago
- 用来存放平时写的一些net内存马,仅用于练手,需要可以自行修改☆89May 3, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,006Jun 4, 2024Updated last year
- NTLM relaying for Windows made easy☆579Apr 25, 2023Updated 2 years ago
- New generation of wmiexec.py☆1,264Jan 5, 2026Updated 2 months ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- In-memory token vault BOF for Cobalt Strike☆149Aug 18, 2022Updated 3 years ago
- A basic emulation of an "RPC Backdoor"☆242Aug 25, 2022Updated 3 years ago
- 远程创建任务计划工具☆190Apr 23, 2022Updated 3 years ago
- A tool to help query AD via the LDAP protocol☆610Sep 25, 2024Updated last year
- OrcaC2是一款基于Websocket加密通信的多功能C&C框架,使用Golang实现。☆676Dec 30, 2022Updated 3 years ago
- Framework for Kerberos relaying☆936May 29, 2022Updated 3 years ago
- Remote operations commands implemented using Beacon Object Files☆1,120Feb 23, 2026Updated 2 weeks ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆277Apr 4, 2023Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆866Mar 20, 2023Updated 2 years ago
- ☆475Nov 20, 2022Updated 3 years ago
- Windows Token Stealing Expert☆485Nov 24, 2023Updated 2 years ago
- JavaPassDump☆272Jan 7, 2022Updated 4 years ago