{"id":1846,"date":"2018-07-07T09:27:19","date_gmt":"2018-07-07T03:57:19","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=1846"},"modified":"2018-07-07T09:27:19","modified_gmt":"2018-07-07T03:57:19","slug":"powerupsql-attacking-sql-server","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/","title":{"rendered":"PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on Scale, and Post Exploitation Attacks"},"content":{"rendered":"<p><strong>PowerUpSQL<\/strong> includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command execution. It is intended to be used during internal penetration tests and red team engagements.<\/p>\n<p>However, PowerUpSQL also includes many functions that can be used by administrators to quickly inventory the SQL Servers in their ADS domain and perform common threat hunting tasks related to SQL Server.<\/p>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/burpsuite\/\" target=\"_blank\" rel=\"noopener\">Burpsuite \u2013 A Beginner\u2019s Guide For Web Application Security or Penetration Testing<\/a><\/strong><\/p>\n<h2 class=\"gh-header-title instapaper_title\"><strong>Setting Up PowerUpSQL<\/strong><\/h2>\n<ul>\n<li class=\"gh-header-title instapaper_title\">Install it from the PowerShell Gallery. This requires local administrative privileges and will permanently install the module.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><code><strong><span style=\"color: #008000;\">Install-Module -Name PowerUpSQL<\/span><\/strong><\/code><\/p>\n<ul>\n<li><code><\/code>Download the project and import it. This does not require administrative privileges and will only be imported into the current session. However, it may be blocked by restrictive execution policies.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><code><strong><span style=\"color: #008000;\">Import-Module PowerUpSQL.psd1<\/span><\/strong><\/code><\/p>\n<ul>\n<li><code><\/code>Load it into a session via a downloading cradle. This does not require administrative privileges and will only be imported into the current session. It should not be blocked by executions policies.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><code><strong><span style=\"color: #008000;\">IEX(New-Object System.Net.WebClient).DownloadString(\"https:\/\/raw.githubusercontent.com\/NetSPI\/PowerUpSQL\/master\/PowerUpSQL.ps1\")<\/span><\/strong><\/code><\/p>\n<p><strong>Note:<\/strong> To run as an alternative domain user, use the runas command to launch PowerShell first.<\/p>\n<p style=\"text-align: center;\"><code><span style=\"color: #008000;\"><strong>runas \/noprofile \/netonly \/user:domain\\user PowerShell.exe<\/strong><\/span><\/code><\/p>\n<h2><strong>Getting Command Help<\/strong><\/h2>\n<ul>\n<li>To list functions from the module, type: <code>Get-Command -Module PowerUpSQL<\/code><\/li>\n<li>To list help for a function, type: <code>Get-Help FunctionName<\/code><\/li>\n<\/ul>\n<p><a href=\"https:\/\/github.com\/NetSPI\/PowerUpSQL\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command execution. It is intended to be used during internal penetration tests and red team engagements. However, PowerUpSQL also includes many functions that can be used by administrators to quickly inventory the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[267,2577,2588,3042,3203],"class_list":["post-1846","post","type-post","status-publish","format-standard","hentry","category-kali","tag-attacking","tag-powershell","tag-powerupsql","tag-server","tag-sql"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server<\/title>\n<meta name=\"description\" content=\"PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on scale, and post explotation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server\" \/>\n<meta property=\"og:description\" content=\"PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on scale, and post explotation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-07T03:57:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on Scale, and Post Exploitation Attacks\",\"datePublished\":\"2018-07-07T03:57:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\"},\"wordCount\":219,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"keywords\":[\"Attacking\",\"PowerShell\",\"PowerUpSQL\",\"Server\",\"sql\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\",\"name\":\"PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"datePublished\":\"2018-07-07T03:57:19+00:00\",\"description\":\"PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on scale, and post explotation\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server","description":"PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on scale, and post explotation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/","og_locale":"en_US","og_type":"article","og_title":"PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server","og_description":"PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on scale, and post explotation","og_url":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-07-07T03:57:19+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing, Privilege Escalation on Scale, and Post Exploitation Attacks","datePublished":"2018-07-07T03:57:19+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/"},"wordCount":219,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","keywords":["Attacking","PowerShell","PowerUpSQL","Server","sql"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/","url":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/","name":"PowerUpSQL - A PowerShell Toolkit for Attacking SQL Server","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","datePublished":"2018-07-07T03:57:19+00:00","description":"PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on scale, and post explotation","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/powerupsql-attacking-sql-server\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4466,"url":"https:\/\/kalilinuxtutorials.com\/commandovm\/","url_meta":{"origin":1846,"position":0},"title":"CommandoVM : Windows-Based Security Distribution for Penetration Testing","author":"R K","date":"April 5, 2019","format":false,"excerpt":"Welcome to CommandoVM a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install Script) Requirements Windows 7 Service Pack 1 or Windows 1060 GB Hard Drive2 GB RAM Instructions Create and configure a new Windows Virtual Machine Ensure VM is updated completely. You may have to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31942,"url":"https:\/\/kalilinuxtutorials.com\/active-directory-exploitation-cheat-sheet\/","url_meta":{"origin":1846,"position":1},"title":"Active Directory Exploitation Cheat Sheet &#8211; A Comprehensive Guide To Enumeration And Attack Methods","author":"Varshini","date":"February 5, 2024","format":false,"excerpt":"This cheat sheet contains common enumeration and attack methods for Windows Active Directory. This cheat sheet is inspired by the\u00a0PayloadAllTheThings\u00a0repo. Summary Active Directory Exploitation Cheat Sheet Summary Tools Domain Enumeration Using PowerView Using AD Module Using BloodHound Remote BloodHound On Site BloodHound Using Adalanche Remote adalanche Useful Enumeration Tools Local\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgv0m-tUPRsyQfIwOsOCIcvRmgxTSTJiqE-wZenrFIR0_f1IN28lwFoJghBUaKBZQ8IJJq2HiTlGiqE2XDqKSiDBqZMGetoTi0yOMNZip57fk2bhrwKHSdaBGowOjmPxL6REQJP1Qefa-Nc4hJze849_cQ3StkhFxvov6qixn_G1KQq9JnjNQm_x0ZYG7gR\/s16000\/Untitled%20design%20%2817%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6140,"url":"https:\/\/kalilinuxtutorials.com\/commandovm-a-fully-customizable-windows-based-pentesting-virtual-machine-distribution\/","url_meta":{"origin":1846,"position":2},"title":"CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution","author":"R K","date":"August 10, 2019","format":false,"excerpt":"Welcome to CommandoVM a fully customizable, Windows-based security distribution for penetration testing and red teaming. Installation Requirements Windows 7 Service Pack 1 or Windows 1060 GB Hard Drive2 GB RAM Recommended Windows 1080+ GB Hard Drive4+ GB RAM2 network adaptersEnable Virtualization support for VMREQUIRED FOR KALI OR DOCKER Instructions Standard\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4356,"url":"https:\/\/kalilinuxtutorials.com\/top-5-sql-injection-tools-for-pentest-hacking\/","url_meta":{"origin":1846,"position":3},"title":"Top 5 SQL Injection Tools for PenTest &amp; Hacking","author":"Pricilla","date":"April 5, 2019","format":false,"excerpt":"SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are inserted into SQL statements via web page input. SQL injection is one of the most common web hacking techniques. Let's see the top 5 SQL injection tool to detect\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5734,"url":"https:\/\/kalilinuxtutorials.com\/commandovm-complete-mandiant-offensive-vm\/","url_meta":{"origin":1846,"position":4},"title":"CommandoVM : Complete Mandiant Offensive VM (Commando VM), The First Full Windows-Based Penetration Testing Virtual Machine Distribution","author":"R K","date":"July 15, 2019","format":false,"excerpt":"Welcome to CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install Script) Requirements Windows 7 Service Pack 1 or Windows 1060 GB Hard Drive2 GB RAM Recommended Windows 1080+ GB Hard Drive4+ GB RAM2 network adaptersEnable Virtualization support for VM Instructions Create and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37228,"url":"https:\/\/kalilinuxtutorials.com\/awesome-redteam\/","url_meta":{"origin":1846,"position":5},"title":"Awesome-Redteam : A Comprehensive Guide To Advanced Red Teaming Tools And Techniques","author":"Varshini","date":"March 26, 2025","format":false,"excerpt":"The Awesome-Redteam repository is a comprehensive collection of tools and resources designed for red teaming and offensive security. It provides a structured approach to various aspects of cybersecurity, including reconnaissance, vulnerability research, exploitation, and post-exploitation techniques. This article will delve into the functionalities of the tools and resources available within\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Awesome-Redteam.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Awesome-Redteam.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Awesome-Redteam.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Awesome-Redteam.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Awesome-Redteam.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Awesome-Redteam.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=1846"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/1846\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=1846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=1846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=1846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}