Skip to content

Releases: n3rada/MSSQLand

v1.0.1

20 Feb 20:14
237b808
Compare
Choose a tag to compare

🛠 Fixed -- Argument Parsing Issue - #2

Now, -- is automatically filtered out during command parsing, ensuring than if someone use this - even if it is not needed - it will handle the case.

Example of incorrect usage

execute-assembly /home/kali/backpack/winaries/csharp/MSSQLand.exe -- /h:localhost /c:token /a:exec whoami

Correct usage (No -- needed)

execute-assembly /home/kali/backpack/winaries/csharp/MSSQLand.exe /h:localhost /c:token /a:exec whoami

📂 Commit Details

Full Changelog: v1.0.0...v1.0.1

The Only MS SQL Tool You’ll Ever Need 🚀

20 Jan 22:04
v1.0.0
49e6b73
Compare
Choose a tag to compare

🎉 Release Highlights

Introducing MSSQLand v1.0, the ultimate tool for navigating Microsoft SQL Server environments. Whether you’re a penetration tester, security researcher, or T-SQL aficionado, MSSQLand is designed to make your work easier, more efficient, and polished. Built with professional penetration testers in mind, but easy enough for anyone to use.

With MSSQLand, you can:

  • Traverse multi-hop linked servers, impersonating users across the chain.
  • Interact with SQL environments, leveraging advanced query capabilities.
  • Extract credentials using the ADSI provider to exploit misconfigured linked servers.
  • Generate professional, Markdown-friendly output, perfect for reporting.
  • Automate complex operations like enumerating permissions, linked servers, and users.
  • Load CLR assemblies and execute remote PowerShell scripts, expanding your attack surface effortlessly.