What is EtherReaper?
EtherReaper wraps the most common internal network and Active Directory attack toolchain into a single persistent web interface. All scan output is logged, stored in SQLite, and viewable after the fact. Credentials captured across sessions are deduplicated and automatically available as a dropdown when running authenticated scans. Stack: FastAPI + Vanilla JS + SQLite. No framework overhead, no containers required.Installation
Set up EtherReaper on Kali Linux with a single setup script
Quickstart
Configure your environment and run your first scan in minutes
Architecture
Understand how EtherReaper’s components work together
API Reference
Explore the full FastAPI backend REST interface
Core capabilities
Network Reconnaissance
Masscan, Nmap, Nuclei, web screenshots with tech detection, and SMB signing checks
Layer 2 Attacks
Responder, mitm6, and ASRepCatcher with live output streaming
Vulnerability Checks
PrintNightmare, SMBGhost, EternalBlue, noPAC, Zerologon, Coerce, and MasterBaiter
Active Directory
BloodHound, Kerberoast, ADCS ESC1–ESC8+, GMSA, Pre2K, Delegation, and more
Credential Management
Persistent credential store with hash calculator and NTLM/Kerberos key derivation
Kerberos Support
Full ccache-based authentication with automatic clock synchronization
Key workflows
Install and configure
Run
sudo ./setup.sh once, then ./run.sh as your regular user. Open http://localhost:8000.Enumerate and attack
Run Nmap to populate the hosts database, then work through recon, Layer 2, vulnerabilities, and AD attacks.
Why EtherReaper?
Traditional penetration testing requires juggling dozens of terminal windows, manually managing output files, and context-switching between tools. EtherReaper solves this by:- Centralizing output — every tool execution is logged with timestamps, output files, and status
- Persisting credentials — captured hashes and passwords are deduplicated and immediately available for follow-on attacks
- Automating tedious steps — ADCS ESC1 chains, ccache acquisition, and hash parsing happen automatically
- Working inside VPNs — web screenshots route through aiohttp so Chromium reaches HTB/OSCP lab targets without
/etc/hostsentries