Title is self explaining, well theres few methods we can do to read locked file and play with it...
☆96Jan 5, 2026Updated last month
Alternatives and similar repositories for IDontLikeFileLocks
Users that are interested in IDontLikeFileLocks are comparing it to the libraries listed below
Sorting:
- Local Privilege Escalation Affecting Millions of Gaming Laptops☆61Jan 19, 2026Updated last month
- ☆64Dec 19, 2024Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆185Jan 17, 2026Updated last month
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- sideloading PoC using onedrive.exe & version.dll☆91Oct 30, 2025Updated 3 months ago
- Beacon Object File (BOF) port of DumpGuard for extracting NTLMv1 hashes from sessions on modern Windows systems.☆209Jan 6, 2026Updated last month
- 资产测绘输出xlsx表格☆14Sep 10, 2024Updated last year
- ☆53Sep 23, 2025Updated 5 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆193Dec 17, 2025Updated 2 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- Local SYSTEM auth trigger for relaying☆168Jul 22, 2025Updated 7 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated last month
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆121Jan 4, 2026Updated last month
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 3 weeks ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆235Feb 20, 2026Updated last week
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- ☆26Dec 29, 2021Updated 4 years ago
- A collection of position independent coding resources☆107Nov 15, 2025Updated 3 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 2 months ago
- A basic C2 framework written in C☆59Jul 7, 2024Updated last year
- ☆138Nov 17, 2025Updated 3 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆70Dec 26, 2025Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆96Mar 20, 2023Updated 2 years ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Self Cleanup in post-ex job☆59Sep 10, 2024Updated last year
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆295Nov 1, 2025Updated 3 months ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 2 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆115Oct 6, 2025Updated 4 months ago
- Self-cleaning in-memory PICO loader for Crystal Palace. Automatically erases traces and operates entirely in memory for stealthy payload …☆48Nov 2, 2025Updated 3 months ago
- ☆126Jan 23, 2025Updated last year
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆117Jan 20, 2025Updated last year
- BOF to run PE in Cobalt Strike Beacon without console creation☆186Nov 23, 2025Updated 3 months ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆34May 30, 2025Updated 8 months ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆33Jun 30, 2021Updated 4 years ago
- ☆12Feb 4, 2025Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆205Aug 21, 2025Updated 6 months ago
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year