NetSPI Labs

We focus on the ideation and incubation of new security products, delivery models, and technology-enabled services. NetSPI Labs represents the investments we are making in bleeding edge research and development at NetSPI, establishing new norms, and driving meaningful change throughout the cybersecurity community, to better serve our customers, and combat an ever-evolving threat landscape.

  • Ideation: Gathering novel ideas and working to quickly understand market opportunity and viability.
  • Design and Build: Guiding rapid design and ensuring cohesion between existing and emerging development.
  • Launching Innovations: Delivering new innovative research, products, and services.
NetSPI Labs

15 Ways to Bypass the PowerShell Execution Policy

By default, PowerShell is configured to prevent the execution of PowerShell scripts on Windows systems. In this blog I’ll cover 15 ways to bypass the PowerShell execution policy without having local administrator rights on the system.

Open Source Tools Contributions

NetSPI Labs focuses on developing practical tools to address evolving security challenges, ensuring organizations stay ahead of threats.

MicroBurst

A PowerShell Toolkit for Attacking Azure. MicroBurst includes functions and scripts that support Azure Services discovery, weak configuration auditing, and post exploitation actions such as credential dumping.

View on GitHub

PowerHuntShares

Focuses on uncovering excessive file share permissions in enterprise networks, helping companies reduce risks associated with unnecessary data access.

View on GitHub

SQLC2

SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and the agent.

View on GitHub

PowerUpSQL

PowerUpSQL supports SQL Server discovery, auditing for common weak configurations, and privilege escalation on scale for internal penetration testing and red team engagements.

View on GitHub

PowerHunt

PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell remoting for data collection at scale. Identify signs of compromise based on artifacts left behind by common MITRE ATT&CK techniques.

View on GitHub

FuncoPop

FuncoPop includes functions and scripts that support attacking Azure Funtion Apps, primarily through exploiting Storage Account Access.

View on GitHub

Evil SQL Client

Evil SQL Client (ESC) is an interactive .NET SQL console client that supports enhanced SQL Server discovery, access, and data exfiltration capabilities.

View on GitHub

NetSPI SQL Injection Wiki

Our wiki is a comprehensive knowledge base for SQL injection. You’ll find resources on identifying, exploiting, and escalating SQL injection vulnerabilities across database management systems.

Access the Wiki

Meet the Labs Team

Headshot of

Karl Fosaaen

VP, Research

Headshot of

Scott Sutherland

VP, Research

Headshot of

Kurtis Shelton

Principal AI Researcher

Headshot of Nick Stang

Nick Stang

Head of Data Science

Headshot of Tristan Blackburn

Tristan Blackburn

Data Scientist

Headshot of Dustin Mallory

Dustin Mallory

Principal Security Research Developer