MSSQL-Analysis-Coerce
Coerced Auth Exploit
An exploit technique to force Windows SQL Server authentication on an arbitrary machine using Python
A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.
125 stars
3 watching
14 forks
Language: Python
last commit: over 1 year ago analysiscoercemssqlpentestwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. | 44 |
| A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 |
| Database security suite with field-level encryption, search through encrypted data, SQL injections prevention and intrusion detection capabilities. | 1,368 |
| A utility for automatically generating and sending multiple payload variations to test GraphQL APIs' strength against common attacks such as brute-forcing, password spraying, and fuzzing. | 318 |
| Automates OSINT analysis of IP addresses and hashes by querying multiple data sources | 535 |
| A tool designed to extract domain users from Active Directory environments by exploiting SQL injection vulnerabilities in MSSQL databases. | 93 |
| Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 143 |
| This project explores bypassing endpoint solutions by creating files with different hashes while maintaining the same signature | 6 |
| A tool that enables controlled manipulation of database operations at runtime | 5 |
| Tools and scripts for cracking custom network authentication systems | 402 |
| Security research and analysis from Microsoft's Security Response Center | 1,332 |
| A collection of precompiled Windows exploit binaries | 1,837 |
| A tool designed to evade static malware detection and enable easy transition from web container environments to C2 environments | 913 |
| An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior | 101 |