SMB deny-share handle research tool. Lock files on an enterprise share with zero writes, zero encryption, and zero alerts in any behavioral defense. Standard user. One API call. No CVE.
☆129May 15, 2026Updated this week
Alternatives and similar repositories for GhostLock
Users that are interested in GhostLock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- InfraGuard is a Command & Control Redirection Proxy and Manager which protects your Red Team Infrastructure against threat attribution☆144Apr 6, 2026Updated last month
- clean-architecture sample of go☆10Dec 1, 2018Updated 7 years ago
- GraphQL server using golang in clean architecture☆10Jul 6, 2020Updated 5 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OWASP WSTG Türkçe Rehber☆16Apr 9, 2025Updated last year
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- Advanced In-Memory PowerShell Process Injection Framework☆74Jul 16, 2025Updated 10 months ago
- Wireshark dissector for Photon messages.☆16Jul 14, 2016Updated 9 years ago
- A single MonoDevelop Addin that transforms a regular MonoDevelop into a version that is tightly integrated with Unity☆19Mar 18, 2016Updated 10 years ago
- Source code snippets using Linux Bluetooth library BlueZ☆23Jun 14, 2019Updated 6 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆17Apr 25, 2025Updated last year
- check cyclomatic complexity of go functions☆20May 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Blender to Renderman Exporter☆15Sep 18, 2011Updated 14 years ago
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Source files etc. for artwork provided with LMMS☆14Nov 10, 2025Updated 6 months ago
- Implementation Clean Code Architecture in Go (Golang) with gin-gonic and Unit Testing☆21Oct 19, 2021Updated 4 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆15May 10, 2023Updated 3 years ago
- A simple web gui for Transmission☆19Sep 25, 2010Updated 15 years ago
- ☆12Dec 6, 2022Updated 3 years ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 10 months ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆95Apr 23, 2025Updated last year
- ☆15Feb 20, 2025Updated last year
- The world's simplest captive portal☆28Apr 28, 2021Updated 5 years ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 21, 2026Updated 3 weeks ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cybersecurity packet capture (PCAP) tools.☆29Jun 22, 2022Updated 3 years ago
- This repository contains deep-dive technical analysis reports that has been written in the ZAYOTEM team.☆13Dec 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Transmission RPC Client☆44May 18, 2014Updated 12 years ago
- Wireless Network Security Analysis Tool Modular terminal toolkit for Wi-Fi security assessment, handshake/PMKID capture, and network dia…☆20May 9, 2026Updated last week
- UNIVERSAL INSTALLER for penguins-eggs on AlmaLinux, Arch, Debian, Devuan, Fedora, Manjaro, openSuSE, RockyLinux, Ubuntu and derivatives☆25Updated this week
- ☆16Feb 2, 2025Updated last year
- Temodar Agent is an AI-powered WordPress plugin and theme security analysis platform built for security researchers, product security tea…☆57Updated this week
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- ☆12Apr 8, 2024Updated 2 years ago