oh-az / NoArgsLinks
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
☆153Updated last year
Alternatives and similar repositories for NoArgs
Users that are interested in NoArgs are comparing it to the libraries listed below
Sorting:
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Evasive Golang Loader☆133Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆207Updated 10 months ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 8 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆138Updated 2 weeks ago
- Command and Control (C2) framework☆128Updated 3 months ago
- ☆164Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆174Updated 5 months ago
- Chrome browser extension-based Command & Control☆166Updated last month
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- ☆182Updated 2 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- AV bypass while you sip your Chai!☆224Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆106Updated 2 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- Adversary Emulation Framework☆123Updated last month
- C or BOF file to extract WebKit master key to decrypt user cookie☆203Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆100Updated 3 years ago
- Execute shellcode files with rundll32☆208Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆205Updated last year
- Automated .NET AppDomain hijack payload generation☆127Updated 6 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- Extracting NetNTLM without touching lsass.exe☆239Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆152Updated 3 weeks ago
- Ghosting-AMSI☆211Updated 4 months ago
- Terminate AV/EDR leveraging BYOVD attack☆101Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 3 months ago