MSSQL-Analysis-Coerce

Coerced Auth Exploit

An exploit technique to force Windows SQL Server authentication on an arbitrary machine using Python

A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.

GitHub

125 stars
3 watching
14 forks
Language: Python
last commit: over 1 year ago
analysiscoercemssqlpentestwindows

Related projects:

Repository Description Stars
attackercan/burp-xss-sql-plugin Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. 44
0xinfection/xsrfprobe A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. 1,116
cossacklabs/acra Database security suite with field-level encryption, search through encrypted data, SQL injections prevention and intrusion detection capabilities. 1,368
nicholasaleks/crackql A utility for automatically generating and sending multiple payload variations to test GraphQL APIs' strength against common attacks such as brute-forcing, password spraying, and fuzzing. 318
1an0rmus/tekdefense-automater Automates OSINT analysis of IP addresses and hashes by querying multiple data sources 535
keramas/mssqli-duet A tool designed to extract domain users from Active Directory environments by exploiting SQL injection vulnerabilities in MSSQL databases. 93
quentinhardy/scriptsandexploits Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code 143
vysecurity/windows-signedbinary This project explores bypassing endpoint solutions by creating files with different hashes while maintaining the same signature 6
u2386/gorm-sqlchaos A tool that enables controlled manipulation of database operations at runtime 5
kpcyrd/authoscope Tools and scripts for cracking custom network authentication systems 402
microsoft/msrc-security-research Security research and analysis from Microsoft's Security Response Center 1,332
abatchy17/windowsexploits A collection of precompiled Windows exploit binaries 1,837
rvn0xsy/cooolis-ms A tool designed to evade static malware detection and enable easy transition from web container environments to C2 environments 913
octoberfest7/cve-2023-36874_bof An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 202
csvl/sema Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior 101