oh-az / NoArgsLinks
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
☆154Updated last year
Alternatives and similar repositories for NoArgs
Users that are interested in NoArgs are comparing it to the libraries listed below
Sorting:
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 4 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆209Updated last year
- 「💀」Proof of concept on BYOVD attack☆164Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆151Updated 3 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Evasive Golang Loader☆138Updated last year
- ☆163Updated 2 years ago
- ☆184Updated 5 months ago
- An interactive shell to spoof some LOLBins command line☆186Updated last year
- Lateral Movement☆124Updated 2 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆198Updated 2 years ago
- Chrome browser extension-based Command & Control☆196Updated 4 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆175Updated 8 months ago
- AV bypass while you sip your Chai!☆223Updated last year
- Amazing whoami alternatives☆142Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 6 months ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆205Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆151Updated last year
- Command and Control (C2) framework☆132Updated 5 months ago
- Stage 0☆164Updated 10 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆193Updated 11 months ago
- A collection of Cobalt Strike Aggressor scripts.☆104Updated 3 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆137Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆180Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago