MSSQL-Analysis-Coerce

Coerced Auth Exploit

An exploit technique to force Windows SQL Server authentication on an arbitrary machine using Python

A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.

GitHub

124 stars
3 watching
14 forks
Language: Python
last commit: about 1 year ago
analysiscoercemssqlpentestwindows

Related projects:

Repository Description Stars
attackercan/burp-xss-sql-plugin Automated tool for detecting cross-site scripting (XSS) and SQL injection vulnerabilities in web applications. 44
0xinfection/xsrfprobe A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. 1,109
cossacklabs/acra Database security suite with field-level encryption, search through encrypted data, SQL injections prevention and intrusion detection capabilities. 1,357
nicholasaleks/crackql A utility for automatically generating and sending multiple payload variations to test GraphQL APIs' strength against common attacks such as brute-forcing, password spraying, and fuzzing. 316
1an0rmus/tekdefense-automater Automates OSINT analysis of IP addresses and hashes by querying multiple data sources 535
keramas/mssqli-duet A tool designed to extract domain users from Active Directory environments by exploiting SQL injection vulnerabilities in MSSQL databases. 92
quentinhardy/scriptsandexploits Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code 142
vysecurity/windows-signedbinary This project explores bypassing endpoint solutions by creating files with different hashes while maintaining the same signature 6
u2386/gorm-sqlchaos A tool that enables controlled manipulation of database operations at runtime 5
kpcyrd/authoscope Tools and scripts for cracking custom network authentication systems 400
microsoft/msrc-security-research Security research and analysis from Microsoft's Security Response Center 1,324
abatchy17/windowsexploits A collection of precompiled Windows exploit binaries 1,831
rvn0xsy/cooolis-ms A tool designed to evade static malware detection and enable easy transition from web container environments to C2 environments 911
octoberfest7/cve-2023-36874_bof An exploit tool for a Windows vulnerability allowing an attacker to run arbitrary code as SYSTEM on Windows 10 and Windows 11 201
csvl/sema Analyzes malware by extracting and comparing system call dependencies to classify and detect malicious behavior 94