brosck / ReaperLinks
γπγProof of concept on BYOVD attack
β164Updated 9 months ago
Alternatives and similar repositories for Reaper
Users that are interested in Reaper are comparing it to the libraries listed below
Sorting:
- Evasive Golang Loaderβ134Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- β164Updated last year
- Shaco is a linux agent for havocβ166Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β173Updated 6 months ago
- Command and Control (C2) frameworkβ131Updated 4 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development courseβ194Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ148Updated last year
- β182Updated 3 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ192Updated 9 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.β193Updated last year
- Patching AmsiOpenSession by forcing an error branchingβ148Updated 2 years ago
- Execute shellcode files with rundll32β208Updated last year
- β200Updated last year
- Collection of random RedTeam scripts.β208Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay aheadβ¦β132Updated 3 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β164Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β307Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β207Updated last year
- Extracting NetNTLM without touching lsass.exeβ240Updated last year
- An interactive shell to spoof some LOLBins command lineβ186Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated last year
- AV bypass while you sip your Chai!β224Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)β180Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β207Updated 10 months ago
- Ghosting-AMSIβ212Updated 4 months ago
- β287Updated 2 years ago
- My implementation of the GIUDA project in C++β186Updated 2 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUSTβ192Updated 11 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.β80Updated 4 months ago