brosck / ReaperLinks
γπγProof of concept on BYOVD attack
β161Updated 7 months ago
Alternatives and similar repositories for Reaper
Users that are interested in Reaper are comparing it to the libraries listed below
Sorting:
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- Evasive Golang Loaderβ132Updated 11 months ago
- β164Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.β168Updated 4 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ147Updated last year
- Execute shellcode files with rundll32β205Updated last year
- Command and Control (C2) frameworkβ126Updated last month
- A shellcode injection tool showcasing various process injection techniquesβ137Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development courseβ193Updated 2 years ago
- Shaco is a linux agent for havocβ165Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.β304Updated last year
- Patching AmsiOpenSession by forcing an error branchingβ146Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.β191Updated last year
- β180Updated last month
- An interactive shell to spoof some LOLBins command lineβ184Updated last year
- β182Updated 11 months ago
- Extracting NetNTLM without touching lsass.exeβ239Updated last year
- Ghosting-AMSIβ205Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to executionβ188Updated 7 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, fβ¦β161Updated last year
- β188Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β202Updated last year
- My implementation of the GIUDA project in C++β185Updated last year
- This repository implements Threadless Injection in Cβ169Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)β178Updated last year
- yet another AV killer tool using BYOVDβ292Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijackingβ255Updated 2 weeks ago
- β282Updated last year
- β167Updated 11 months ago
- Adversary Emulation Frameworkβ119Updated 2 weeks ago