Python tool to interact with WMI StdRegProv
☆60Nov 19, 2024Updated last year
Alternatives and similar repositories for reg_snake
Users that are interested in reg_snake are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆33Jan 23, 2025Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool for viewing NTDS.dit☆197Mar 14, 2025Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- ☆41Oct 8, 2024Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- ☆53Sep 23, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- ☆139Nov 17, 2025Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆347Nov 19, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- ☆234Oct 8, 2024Updated last year
- ☆35Mar 18, 2026Updated last week
- ☆87Jan 21, 2025Updated last year
- ☆136Feb 11, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ForsHops☆153Mar 25, 2025Updated last year
- Utilities for Pentesting with BloodHound☆23Feb 20, 2026Updated last month
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆53Jun 28, 2025Updated 8 months ago
- ☆26Nov 8, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆249Sep 8, 2024Updated last year
- ☆147Nov 6, 2025Updated 4 months ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆100Sep 1, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- ☆429Apr 22, 2025Updated 11 months ago
- Collect Windows telemetry for Maldev☆465Jan 30, 2026Updated last month