PowerUpSQL.psd1
#requires -Version 1 @{ ModuleToProcess = 'PowerUpSQL.psm1' ModuleVersion = '1.103.3' GUID = 'dd1fe106-2226-4869-9363-44469e930a4a' Author = 'Scott Sutherland' Copyright = 'BSD 3-Clause' Description = 'PowerUpSQL is an offensive toolkit designed for attacking SQL Server. The PowerUpSQL module includes functions that support SQL Server discovery, auditing for common weak configurations, and privilege escalation on scale. It is intended to be used during penetration tests and red team engagements. However, PowerUpSQL also includes many functions that could be used by administrators to inventory the SQL Servers on their ADS domain very quickly. More information can be found at https://github.com/NetSPI/PowerUpSQL.' PowerShellVersion = '2.0' FunctionsToExport = @( 'Create-SQLFileXpDll', 'Create-SQLFileCLRDll', 'Get-SQLAgentJob', 'Get-SQLAssemblyFile', 'Get-SQLAuditDatabaseSpec', 'Get-SQLAuditServerSpec', 'Get-SQLColumn', 'Get-SQLColumnSampleData', 'Get-SQLColumnSampleDataThreaded', 'Get-SQLConnectionTest', 'Get-SQLConnectionTestThreaded', 'Get-SQLDatabase', 'Get-SQLDatabasePriv', 'Get-SQLDatabaseRole', 'Get-SQLDatabaseRoleMember', 'Get-SQLDatabaseSchema', 'Get-SQLDatabaseThreaded', 'Get-SQLDatabaseUser', 'Get-SQLDomainObject', 'Get-SQLDomainComputer', 'Get-SQLDomainUser', 'Get-SQLDomainSubnet', 'Get-SQLDomainSite', 'Get-SQLDomainGroup', 'Get-SQLDomainOu', 'Get-SQLDomainAccountPolicy', 'Get-SQLDomainTrust', 'Get-SQLDomainPasswordsLAPS', 'Get-SQLDomainController', 'Get-SQLDomainExploitableSystem', 'Get-SQLDomainGroupMember', 'Get-SQLFuzzDatabaseName', 'Get-SQLFuzzDomainAccount', 'Get-SQLFuzzObjectName', 'Get-SQLFuzzServerLogin' 'Get-SQLInstanceBroadcast', 'Get-SQLInstanceDomain', 'Get-SQLInstanceFile', 'Get-SQLInstanceLocal', 'Get-SQLInstanceScanUDP', 'Get-SQLInstanceScanUDPThreaded', 'Get-SQLLocalAdminCheck', 'Get-SQLOleDbProvder', 'Get-SQLQuery', 'Get-SQLQueryThreaded', 'Get-SQLRecoverPwAutoLogon', 'Get-SQLServerConfiguration', 'Get-SQLServerCredential', 'Get-SQLServerInfo', 'Get-SQLServerInfoThreaded', 'Get-SQLServerLink', 'Get-SQLServerLinkCrawl', 'Get-SQLServerLinkData', 'Get-SQLServerLinkQuery', 'Get-SQLServerLogin', 'Get-SQLServerLoginDefaultPw', 'Get-SQLServerPasswordHash', 'Get-SQLServerPolicy', 'Get-SQLServerPriv', 'Get-SQLServerRole', 'Get-SQLServerRoleMember', 'Get-SQLServiceAccount', 'Get-SQLServiceLocal', 'Get-SQLSession', 'Get-SQLStoredProcedure', 'Get-SQLStoredProcedureCLR', 'Get-SQLStoredProcedureSQLi', 'Get-SQLStoredProcedureAutoExec', 'Get-SQLStoredProcedureXp', 'Get-SQLSysadminCheck', 'Get-SQLTable', 'Get-SQLTriggerDdl', 'Get-SQLTriggerDml', 'Get-SQLView', 'Invoke-SQLAudit', 'Invoke-SQLAuditPrivCreateProcedure', 'Invoke-SQLAuditPrivDbChaining', 'Invoke-SQLAuditPrivImpersonateLogin', 'Invoke-SQLAuditPrivServerLink', 'Invoke-SQLAuditPrivTrustworthy', 'Invoke-SQLAuditPrivXpDirtree', 'Invoke-SQLAuditPrivXpFileexit', 'Invoke-SQLAuditRoleDbDdlAdmin', 'Invoke-SQLAuditRoleDbOwner', 'Invoke-SQLAuditSampleDataByColumn', 'Invoke-SQLAuditWeakLoginPw', 'Invoke-SQLAuditSQLiSpExecuteAs', 'Invoke-SQLAuditSQLiSpSigned', 'Invoke-SQLAuditDefaultLoginPw', 'Invoke-SQLAuditPrivAutoExecSp', 'Invoke-SQLDumpInfo', 'Invoke-SQLEscalatePriv', 'Invoke-SQLImpersonateService', 'Invoke-SQLImpersonateServiceCmd', 'Invoke-SQLUncPathInjection', 'Invoke-SQLOSCmd', 'Invoke-SQLOSCmdCLR', 'Invoke-SQLOSCmdCOle', 'Invoke-SQLOSCmdPython', 'Invoke-SQLOSCmdR', 'Invoke-SQLOSCmdAgentJob', 'Invoke-TokenManipulation' ) FileList = 'PowerUpSQL.psm1', 'PowerUpSQL.ps1', 'README.md' } |