Python tool to interact with WMI StdRegProv
☆60Nov 19, 2024Updated last year
Alternatives and similar repositories for reg_snake
Users that are interested in reg_snake are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆35Jan 23, 2025Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- Sniffing files generator☆62Feb 24, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool for viewing NTDS.dit☆198Mar 14, 2025Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- ☆108Aug 21, 2024Updated last year
- ☆60Oct 24, 2024Updated last year
- ☆42Oct 8, 2024Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆77Nov 11, 2024Updated last year
- ☆52Mar 30, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- ☆138Nov 17, 2025Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆348Nov 19, 2024Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆59Jul 23, 2025Updated 8 months ago
- ☆37Mar 18, 2026Updated 3 weeks ago
- ☆235Oct 8, 2024Updated last year
- ☆97Jan 21, 2025Updated last year
- ☆136Feb 11, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ForsHops☆154Mar 25, 2025Updated last year
- Utilities for Pentesting with BloodHound☆23Apr 7, 2026Updated last week
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- ☆53Jun 28, 2025Updated 9 months ago
- ☆26Nov 8, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆252Sep 8, 2024Updated last year
- ☆147Nov 6, 2025Updated 5 months ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆100Sep 1, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆126Sep 12, 2024Updated last year
- ☆430Apr 22, 2025Updated 11 months ago
- Collect Windows telemetry for Maldev☆467Jan 30, 2026Updated 2 months ago