SySS-Research / MATLinks
This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers
☆53Updated last year
Alternatives and similar repositories for MAT
Users that are interested in MAT are comparing it to the libraries listed below
Sorting:
- ☆89Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Updated 2 years ago
- To audit the security of read-only domain controllers☆118Updated 2 years ago
- Winsocket for Cobalt Strike.☆102Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- CVE-2024-40711-exp☆42Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago
- A C# port from Invoke-GhostTask☆119Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 5 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Updated 2 years ago
- PAN-OS auth bypass + RCE☆47Updated last year
- ownCloud exploits for CVE-2023-49105☆36Updated 2 years ago
- Dump Windows SAM hashes☆42Updated 2 years ago
- Extract all users from an Active Directory domain to an Excel worksheet.☆35Updated last year
- A LAPS dumper written using the impacket library.☆32Updated 2 years ago
- ☆92Updated last year
- Golang reverse proxy with CobaltStrike malleable profile validation.☆109Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- Execute commands in other Sessions☆91Updated last year
- A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET☆59Updated last month
- Parses Cobalt Strike malleable C2 profiles.☆60Updated last week
- ☆94Updated 2 years ago
- CobaltStrike beacon written in golang☆27Updated 2 years ago
- Exploit for the CVE-2024-5806☆45Updated last year
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 3 years ago
- Azure AD Password Checker☆86Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Updated 2 years ago