Just another EDR killer
☆125Jan 21, 2026Updated last month
Alternatives and similar repositories for TopazTerminator
Users that are interested in TopazTerminator are comparing it to the libraries listed below
Sorting:
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated last month
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Updated this week
- ☆39Nov 25, 2025Updated 3 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆332Jan 24, 2026Updated last month
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- ☆36Jul 1, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated last month
- Bloodhound python Ingestor using ADWS☆31Feb 4, 2026Updated 3 weeks ago
- ☆84May 19, 2024Updated last year
- Arsenal of modules to beacon postex☆94Feb 18, 2026Updated last week
- This C# tool sprays for admin access over the entire domain☆88Dec 7, 2025Updated 2 months ago
- Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall☆132Dec 17, 2025Updated 2 months ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆339Feb 2, 2026Updated last month
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆89Jan 2, 2026Updated 2 months ago
- Find .net assemblies locally☆133Oct 14, 2022Updated 3 years ago
- ☆100Sep 1, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆202Dec 17, 2025Updated 2 months ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆188Aug 6, 2025Updated 6 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- Title is self explaining, well theres few methods we can do to read locked file and play with it...☆96Jan 5, 2026Updated last month
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆309Feb 16, 2026Updated 2 weeks ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 10 months ago
- ☆169Oct 21, 2025Updated 4 months ago
- A C# PE loader for x64 and x86 PE files.☆47Updated this week
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆275Feb 2, 2026Updated last month
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- ☆31Jul 26, 2024Updated last year
- ☆58Dec 10, 2025Updated 2 months ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 3 months ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year
- Safe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintai…☆76Oct 27, 2025Updated 4 months ago