Skip to content

An educational PowerShell research tool that demonstrates weaknesses in Windows EXE execution controls during authorized security testing.

License

Notifications You must be signed in to change notification settings

giriaryan694-a11y/EXELockBypass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

EXELockBypass

Bypass EXE installation locks in Windows using PowerShell. Made by Aryan Giri


📌 Overview

EXELockBypass is a PowerShell script designed to bypass EXE installation restrictions in Windows by leveraging the __COMPAT_LAYER=RunAsInvoker technique.

This project is intended strictly for educational learning, red team simulations, and authorized security testing in controlled environments.


🛠 Features

  • Bypasses common EXE installation locks (e.g., AppLocker, Software Restriction Policies)
  • Simple text-based interface
  • Input validation and basic error handling
  • Lightweight and portable (single script)
  • Does not require administrator privileges

🚀 Usage

  1. Download the script:

    EXELockBypass.ps1
  2. Run the script in PowerShell:

    .\EXELockBypass.ps1
  3. When prompted, enter the full path of the EXE you want to run.


📝 Example Output

EXELockBypass
-------------
Bypass EXE installation locks in Windows
Made by Aryan Giri

Enter the full path of the EXE to bypass (e.g., C:\path\to\setup.exe): C:\locked\app.exe
[*] Attempting to bypass EXE lock for: C:\locked\app.exe
[+] Success! The EXE should now run without restrictions.

🔐 Ethics & Disclaimer

Important Notice

  • Use this tool responsibly and legally
  • Only test on systems you own or have explicit permission to assess
  • Do not use this tool to bypass organizational security policies without authorization

The author is not responsible for any misuse or damage caused by this tool.


🛡️ Mitigation & Defense

This project also includes a dedicated defensive research document:

  • 👉 Mitigation & Defensive Guidance — explains how to detect, prevent, and harden systems against the compatibility-layer technique demonstrated in this tool.

The mitigation content is written from a blue-team and SOC perspective and is safe for enterprise and educational environments.


📜 License

This project is open-source and released under the MIT License.


✍️ Author

Aryan Giri Cybersecurity Researcher

"True power lies in understanding systems, not breaking trust."

About

An educational PowerShell research tool that demonstrates weaknesses in Windows EXE execution controls during authorized security testing.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published