MSSQL-Analysis-Coerce
Coerced Auth Exploit
An exploit technique to force Windows SQL Server authentication on an arbitrary machine using Python
A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.
125 stars
3 watching
14 forks
Language: Python
last commit: about 2 years ago analysiscoercemssqlpentestwindows
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. | 44 |
| | A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 |
| | Database security suite with field-level encryption, search through encrypted data, SQL injections prevention and intrusion detection capabilities. | 1,368 |
| | A utility for automatically generating and sending multiple payload variations to test GraphQL APIs' strength against common attacks such as brute-forcing, password spraying, and fuzzing. | 318 |
| | Automates OSINT analysis of IP addresses and hashes by querying multiple data sources | 535 |
| | A tool designed to extract domain users from Active Directory environments by exploiting SQL injection vulnerabilities in MSSQL databases. | 93 |
| | Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 143 |
| | This project explores bypassing endpoint solutions by creating files with different hashes while maintaining the same signature | 6 |
| | A tool that enables controlled manipulation of database operations at runtime | 5 |
| | Tools and scripts for cracking custom network authentication systems | 402 |
| | Security research and analysis from Microsoft's Security Response Center | 1,332 |
| | A collection of precompiled Windows exploit binaries | 1,837 |
| | A tool designed to evade static malware detection and enable easy transition from web container environments to C2 environments | 913 |
| | An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 | 202 |
| | Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior | 101 |