SySS-Research / MATLinks
This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers
☆53Updated last year
Alternatives and similar repositories for MAT
Users that are interested in MAT are comparing it to the libraries listed below
Sorting:
- ☆89Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- Winsocket for Cobalt Strike.☆101Updated 2 years ago
- To audit the security of read-only domain controllers☆117Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆52Updated last year
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆87Updated 2 years ago
- Execute commands in other Sessions☆91Updated last year
- A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET☆57Updated 3 years ago
- CVE-2024-40711-exp☆42Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Updated last year
- Golang reverse proxy with CobaltStrike malleable profile validation.☆110Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- PAN-OS auth bypass + RCE☆47Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆42Updated 3 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Updated 11 months ago
- Dump Windows SAM hashes☆42Updated 2 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated last year
- Parses Cobalt Strike malleable C2 profiles.☆58Updated last week
- ☆93Updated 2 years ago
- A C# port from Invoke-GhostTask☆118Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Updated last year
- ☆53Updated 3 years ago
- ownCloud exploits for CVE-2023-49105☆36Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆146Updated 3 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 2 years ago