Python tool to interact with WMI StdRegProv
☆60Nov 19, 2024Updated last year
Alternatives and similar repositories for reg_snake
Users that are interested in reg_snake are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- ☆36Jan 23, 2025Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆272Nov 12, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool for viewing NTDS.dit☆199Mar 14, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- ☆61Oct 24, 2024Updated last year
- ☆42Oct 8, 2024Updated last year
- ☆52Mar 30, 2026Updated last month
- Exploiting the KsecDD Windows driver through Server Silos☆79Nov 11, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- ☆139Nov 17, 2025Updated 5 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆350Nov 19, 2024Updated last year
- ☆37Mar 18, 2026Updated last month
- Python3 rewrite of AsOutsider features of AADInternals☆60Jul 23, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- ☆97Jan 21, 2025Updated last year
- ☆136Feb 11, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ForsHops☆154Mar 25, 2025Updated last year
- Utilities for Pentesting with BloodHound☆23Apr 23, 2026Updated last week
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆55Jun 28, 2025Updated 10 months ago
- ☆26Nov 8, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆253Sep 8, 2024Updated last year
- ☆147Nov 6, 2025Updated 5 months ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆100Sep 1, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- An example reference design for a proposed BOF PE☆206Jan 23, 2026Updated 3 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- ☆430Apr 22, 2025Updated last year
- IP address filter by City☆12Jan 17, 2025Updated last year