iSECPartners / sqlperms
A tool for calculating necessary SQL Server permissions
☆24Updated 10 years ago
Alternatives and similar repositories for sqlperms:
Users that are interested in sqlperms are comparing it to the libraries listed below
- Websocket based egress tester☆20Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- ☆53Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆36Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- ☆25Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- ☆12Updated 7 years ago
- post-exploitation tools☆15Updated 6 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Lair Framework dockerized.☆38Updated 3 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆33Updated 12 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Useful Powershell modules.☆11Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Automatically scans for malicious proxies.☆29Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago