ananth-she11z / AutoSQL
A tool to enumerate and exploit SQL Servers in AD
☆34Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AutoSQL
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆78Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆71Updated last year
- SeRestorePrivilege to SYSTEM☆80Updated 3 years ago
- Windows Privilege Escalation☆43Updated 2 years ago
- ☆28Updated 3 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆60Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆94Updated 5 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆115Updated 7 months ago
- AV EVASION TECHNIQUES☆74Updated 2 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆108Updated last month
- Lateral Movement☆119Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆88Updated last year
- ☆77Updated last year
- ☆112Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆166Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 11 months ago
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆104Updated last month
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆36Updated last year
- ☆89Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆169Updated last month
- Github as C2 Demonstration , free API = free C2 Infrastructure☆130Updated last year
- ☆82Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆163Updated 2 weeks ago