oh-az / NoArgsLinks
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
☆152Updated last year
Alternatives and similar repositories for NoArgs
Users that are interested in NoArgs are comparing it to the libraries listed below
Sorting:
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- ☆178Updated last week
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆167Updated 3 months ago
- Continuous password spraying tool☆189Updated 3 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Extracting NetNTLM without touching lsass.exe☆238Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 9 months ago
- Ghosting-AMSI☆191Updated 2 months ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 6 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- ☆177Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆255Updated 10 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆199Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆131Updated 7 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated this week
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- ☆206Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆188Updated 6 months ago
- Stage 0☆161Updated 6 months ago
- AV bypass while you sip your Chai!☆221Updated last year
- Evasive Golang Loader☆131Updated 10 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆305Updated 7 months ago
- ☆159Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆131Updated 3 weeks ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆140Updated last year