oh-az / NoArgs
NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Windows APIs to dynamically manipulate the Windows internals on the go. This allows NoArgs to alter process arguments discreetly.
☆144Updated 4 months ago
Related projects: ⓘ
- Continuous password spraying tool☆112Updated 3 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 3 months ago
- ☆131Updated 3 months ago
- C2 Infrastructure Automation☆82Updated last month
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆171Updated last year
- An interactive shell to spoof some LOLBins command line☆179Updated 7 months ago
- 「💀」Proof of concept on BYOVD attack☆147Updated 6 months ago
- Execute shellcode files with rundll32☆171Updated 7 months ago
- ☆125Updated 8 months ago
- Extracting NetNTLM without touching lsass.exe☆223Updated 9 months ago
- Evasive Golang Loader☆129Updated last month
- AV bypass while you sip your Chai!☆205Updated 4 months ago
- A collection of Cobalt Strike Aggressor scripts.☆80Updated 2 years ago
- Command and Control (C2) framework☆122Updated 5 months ago
- ☆155Updated 10 months ago
- ☆119Updated last month
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆114Updated last month
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆242Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆136Updated last month
- C# AV/EDR Killer using less-known driver (BYOVD)☆144Updated 10 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆87Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated 11 months ago
- Automated .NET AppDomain hijack payload generation☆112Updated 2 months ago
- ☆222Updated this week
- ☆110Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆266Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 2 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆59Updated last year
- Different methods to get current username without using whoami☆170Updated 7 months ago