Python tool to interact with WMI StdRegProv
☆60Nov 19, 2024Updated last year
Alternatives and similar repositories for reg_snake
Users that are interested in reg_snake are comparing it to the libraries listed below
Sorting:
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆40Oct 8, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- ☆86Jan 21, 2025Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Tool for viewing NTDS.dit☆194Mar 14, 2025Updated 11 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 7 months ago
- ☆108Aug 21, 2024Updated last year
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- Sniffing files generator☆61Feb 24, 2025Updated last year
- ☆138Nov 17, 2025Updated 3 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- ☆146Nov 6, 2025Updated 3 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- ☆234Oct 8, 2024Updated last year
- ☆137Feb 11, 2025Updated last year
- ☆51Jun 28, 2025Updated 8 months ago
- ☆26Nov 8, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆261Nov 22, 2025Updated 3 months ago
- ☆53Sep 23, 2025Updated 5 months ago
- Retrieve inner payloads from Donut samples☆120Dec 1, 2025Updated 3 months ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- Local SYSTEM auth trigger for relaying☆169Jul 22, 2025Updated 7 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 8 months ago
- Tool to remotely dump secrets from the Windows registry☆521Updated this week
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- ☆100Sep 1, 2024Updated last year
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 3 months ago
- ☆32Feb 13, 2026Updated 2 weeks ago