Skip to content
View n3rada's full-sized avatar

Block or report n3rada

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
n3rada/README.md

👀

Programming is mostly about thinking. Hacking is about thinking one step ahead.

One of my commit sha starts with "a". I used only emojis in my commit message. My favorite word is "update". I am a polite coder. I collected 100 stars. I commit in the morning. I commit in the evening. I am a sleepy coder. Happy February 29th! I committed on a Leap Day! One of my commit sha starts with "ab". I pushed a commit with "cafe" once. I committed on Friday the 13th, One… By One… I've starred 4 my own repositories. I did 2 sequential fixes. Happy Programmers Day! I committed on a 256 Day of Year! I joined GitHub 5 years ago. I have three public keys When I delete code, I delete a lot. I made an epic commit with a message over 500 chars. I did 4 sequential fixes. I did 13 sequential fixes. I did 3 sequential fixes. I did 5 sequential fixes. I did 6 sequential fixes. I committed on the Halloween! Boo!

📦 Toolbox

Microsoft SQL Server (MS SQL / MSSQL)

These two tools are designed to simplify complex T-SQL interactions for Microsoft SQL Server environments. You can impersonate any user along the way to the last linked server in your chain. Both tools prioritize modularity, extensibility, and operator experience, following robust OOP practices and addressing real-world red team requirements. Each tool serves a distinct purpose.

  • mssqlclient-ng: A Python3 tool built upon Impacket’s mssqlclient.py, ideal for external access.
  • MSSQLand: The C# executable twin, designed for beacon assembly execution and restricted environments.

Grab Bag

Some tools fit neatly into categories, while others belong in a grab bag of utilities:

  • msauth-browser: A Python3 tool that leverages Playwright browser automation to extract Microsoft OAuth tokens. Ideal for Microsoft Graph and M365 red team operations.
  • sapsxpg: If you’ve ever worked with SAP during a penetration test, you know how cumbersome using SXPG_CALL_SYSTEM on a SAP server can be. This tool is for you.

📫 Reach Me At: /dev/null - or find your way to.
You cannot change the past but you can sculpt your future

Pinned Loading

  1. toboggan toboggan Public

    🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse shells are impractical.

    Python 13 1

  2. mssqlclient-ng mssqlclient-ng Public

    Enhanced version of impacket's mssqlclient.py. It lets you interact with Microsoft SQL Server (MS SQL / MSSQL) servers and their linked instances, impersonating any account encountered along the wa…

    Python

  3. sapsxpg sapsxpg Public

    Simplify the SXPG_CALL_SYSTEM function module (FM) usage for enumeration on a targeted SAP system. Create a SAP RCE PoC.

    Python 2

  4. msauth-browser msauth-browser Public

    🎭 Extract Microsoft OAuth tokens using Playwright browser automation.

    Python

  5. SharpNotesReader SharpNotesReader Public

    A C# light executable that read Windows 11 Notes from TabState directory.

    C# 3

  6. ropcatalog ropcatalog Public

    Finding and classifying ROP gadgets from rp++ output file with some regex and a CLI.

    Python 12