NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
☆154May 7, 2024Updated last year
Alternatives and similar repositories for NoArgs
Users that are interested in NoArgs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- A beacon object file implementation of PoolParty Process Injection Technique.☆444Dec 21, 2023Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆210Mar 10, 2024Updated 2 years ago
- A BOF that runs unmanaged PEs inline☆690Oct 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 3 months ago
- .net config loader☆350Nov 9, 2023Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆328Apr 12, 2024Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Jun 10, 2024Updated last year
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆200May 29, 2025Updated 10 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 9 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆170May 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lockless BOF☆79May 2, 2025Updated 11 months ago
- Local & remote Windows DLL Proxying☆174Jun 17, 2024Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆343Feb 2, 2026Updated 2 months ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆145Mar 16, 2024Updated 2 years ago
- ☆91May 15, 2024Updated last year
- Process injection alternative☆407Sep 6, 2024Updated last year
- Linux Sleep Obfuscation☆114Jan 7, 2024Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A C# port from Invoke-GhostTask☆120Jan 5, 2024Updated 2 years ago
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Jun 12, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 11 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆428Feb 11, 2024Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆107Jan 24, 2024Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆380Jun 22, 2025Updated 9 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆203Dec 27, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Amazing whoami alternatives☆141Mar 23, 2024Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- ☆176Mar 27, 2023Updated 3 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Library of BOFs to interact with SQL servers☆231Dec 3, 2025Updated 4 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆622Jan 2, 2025Updated last year
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated 2 years ago