ananth-she11z / AutoSQL
A tool to enumerate and exploit SQL Servers in AD
☆34Updated last year
Alternatives and similar repositories for AutoSQL:
Users that are interested in AutoSQL are comparing it to the libraries listed below
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆80Updated 3 years ago
- Lateral Movement☆123Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆31Updated 3 years ago
- ☆48Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆127Updated last year
- ☆79Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆108Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆169Updated 2 years ago
- Windows Privilege Escalation☆56Updated 2 years ago
- AV EVASION TECHNIQUES☆77Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- A variety of AV evasion techniques written in C# for practice.☆85Updated 3 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆192Updated 5 months ago
- SeRestorePrivilege to SYSTEM☆95Updated 3 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆110Updated 3 years ago
- ☆96Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆168Updated 4 months ago
- A RunAs clone with the ability to specify the password as an argument.☆111Updated last year
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆71Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆40Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆69Updated 7 months ago
- ACL abuse swiss-knife☆119Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago
- ☆83Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆110Updated 11 months ago
- C# havoc implant☆100Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆49Updated last year
- .bin file to shellcode convertor☆34Updated 8 months ago