brosck / ReaperLinks
γπγProof of concept on BYOVD attack
β165Updated last year
Alternatives and similar repositories for Reaper
Users that are interested in Reaper are comparing it to the libraries listed below
Sorting:
- Evasive Golang Loaderβ137Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β155Updated last year
- Shaco is a linux agent for havocβ169Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branchingβ154Updated 2 years ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β307Updated 2 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β184Updated 10 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development courseβ207Updated 2 years ago
- Execute shellcode files with rundll32β214Updated 2 years ago
- β186Updated 7 months ago
- β209Updated 2 years ago
- β169Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ149Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β167Updated last year
- Collection of random RedTeam scripts.β211Updated last year
- Native Syscalls Shellcode Injectorβ267Updated 2 years ago
- Command and Control (C2) frameworkβ132Updated 8 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.β202Updated 2 years ago
- AV bypass while you sip your Chai!β226Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ194Updated last year
- Extracting NetNTLM without touching lsass.exeβ242Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniquesβ136Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay aheadβ¦β138Updated 8 months ago
- β244Updated last year
- β290Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookieβ207Updated last year
- This repository implements Threadless Injection in Cβ172Updated 2 years ago
- β163Updated 2 years ago
- My implementation of the GIUDA project in C++β188Updated 2 years ago
- yet another AV killer tool using BYOVDβ300Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β213Updated last year