cmd.exe /c cipher /W:C

The Microsoft documentation describes this in the following way:

https://www.volexity.com/wp-content/uploads/2024/11/image003a.png

The effect is that attackers are able to securely delete their tools using native Windows functionality without bringing a new tool or writing their own code, thus making recovery of attacker tools more difficult for forensic analysts.

https://github.com/infosecn1nja/Red-Teaming-Toolkit

SharpCollection/NetFramework_4.5_Any at master ยท Flangvik/SharpCollection

offsec.tools

A vast collection of security tools

https://github.com/onekey-sec/unblob