oh-az / NoArgsLinks
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
☆153Updated last year
Alternatives and similar repositories for NoArgs
Users that are interested in NoArgs are comparing it to the libraries listed below
Sorting:
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- 「💀」Proof of concept on BYOVD attack☆161Updated 7 months ago
- ☆164Updated last year
- ☆180Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆202Updated 8 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆132Updated 8 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated 11 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- Evasive Golang Loader☆132Updated 11 months ago
- Adversary Emulation Framework☆119Updated 2 weeks ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆168Updated 4 months ago
- ☆186Updated 3 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆255Updated 2 weeks ago
- TeamServer and Client of Exploration Command and Control Framework☆139Updated last month
- ☆136Updated last year
- AV bypass while you sip your Chai!☆222Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆150Updated 9 months ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- Command and Control (C2) framework☆126Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆202Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆194Updated 4 months ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆105Updated 3 weeks ago
- Ghosting-AMSI☆205Updated 2 months ago
- Automated .NET AppDomain hijack payload generation☆126Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated 2 months ago
- Lateral Movement☆124Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year
- Stage 0☆161Updated 6 months ago