brosck / ReaperLinks
γπγProof of concept on BYOVD attack
β165Updated last year
Alternatives and similar repositories for Reaper
Users that are interested in Reaper are comparing it to the libraries listed below
Sorting:
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β155Updated last year
- β186Updated 7 months ago
- Evasive Golang Loaderβ137Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β184Updated 10 months ago
- Shaco is a linux agent for havocβ169Updated 2 years ago
- Extracting NetNTLM without touching lsass.exeβ242Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ194Updated last year
- Patching AmsiOpenSession by forcing an error branchingβ155Updated 2 years ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functionsβ265Updated 10 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development courseβ207Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ149Updated last year
- Execute shellcode files with rundll32β214Updated 2 years ago
- Collection of random RedTeam scripts.β211Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β212Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookieβ207Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)β183Updated 2 years ago
- β169Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated 2 years ago
- β209Updated 2 years ago
- Command and Control (C2) frameworkβ132Updated 8 months ago
- My implementation of the GIUDA project in C++β188Updated 2 years ago
- AV bypass while you sip your Chai!β226Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.β202Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijackingβ326Updated 2 years ago
- Ghosting-AMSIβ220Updated 9 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β167Updated last year
- β163Updated 2 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β212Updated last year
- β246Updated last year
- An interactive shell to spoof some LOLBins command lineβ188Updated 2 years ago