mindspoof / MSSQL-Fileless-Rootkit-WarSQLKit
WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on MS-SQL servers. Thus, malicious code can be executed in the process memory of the SQL service without creating a malicious function
☆251Updated last year
Alternatives and similar repositories for MSSQL-Fileless-Rootkit-WarSQLKit:
Users that are interested in MSSQL-Fileless-Rootkit-WarSQLKit are comparing it to the libraries listed below
- .NET后渗透下的权限维持,附下载DLL☆203Updated 6 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆240Updated 4 years ago
- ☆156Updated 4 years ago
- Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物☆225Updated 2 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆257Updated 2 years ago
- powershell codes of my blog.☆102Updated 5 years ago
- Yet another SharpSphere☆221Updated 3 years ago
- about CobaltStrike☆150Updated last year
- weblogic t3 deserialization rce☆268Updated 7 years ago
- 鱼儿在cs上线后自动收杆|Automatically stop fishing in javascript after the fish is hooked☆135Updated 4 years ago
- c# 读取登录过本机的登录失败或登录成功(4624,4625)的所有计算机信息,在内网渗透中快速定位运维管理人员。☆205Updated 5 years ago
- ☆288Updated 5 years ago
- ☆219Updated 3 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- backdoor☆248Updated 5 years ago
- 提 取DC日志,快速获取域用户对应IP地址☆300Updated 3 years ago
- nim一键免杀☆213Updated 4 years ago
- CS免杀加载器☆143Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆138Updated 4 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆153Updated 4 years ago
- shellcode 异或加密并生成dll☆249Updated 4 years ago
- A simple python script to generate XML payloads works for XMLDecoder based on ProcessBuilder and Runtime exec☆149Updated 4 years ago
- 影子用户 克隆☆228Updated 3 years ago
- WINDOWS TELEMETRY权限维持☆258Updated 4 years ago
- A JSP backdoor that enables under Tomcat hiding arbitrary JSP files, in addition to their access logs.☆214Updated 5 years ago
- weaponized tool for CVE-2020-17144☆160Updated 4 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆122Updated 4 years ago
- CVE-2021-3156非交互式执行命令☆201Updated 4 years ago
- This project is used to collect the EXP/POC disclosed on the Internet and provide project support for Heptagram security team.☆81Updated 9 months ago
- 解密weblogic AES或DES加密方法☆229Updated 4 years ago