Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.
☆1,442Mar 7, 2026Updated this week
Alternatives and similar repositories for raptor
Users that are interested in raptor are comparing it to the libraries listed below
Sorting:
- This is practice VM for malware development☆180Nov 17, 2025Updated 3 months ago
- AI agent for autonomous cyber operations☆496Nov 29, 2025Updated 3 months ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆758Updated this week
- Zero shot vulnerability discovery using LLMs☆2,511Feb 6, 2025Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆240Feb 20, 2026Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆93Dec 7, 2025Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆384Nov 26, 2024Updated last year
- ☆58Dec 10, 2025Updated 3 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 4 months ago
- Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, …☆70Nov 23, 2025Updated 3 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,051Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,402Jun 24, 2025Updated 8 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆303Jan 20, 2026Updated last month
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- Cybersecurity AI (CAI), the framework for AI Security☆7,349Jan 30, 2026Updated last month
- ☆15Oct 29, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Automatic Exploit Generation with LLMs☆572Jan 30, 2026Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- All kinds of tiny shells☆65Feb 3, 2023Updated 3 years ago
- SAST + LLM Interprocedural Context Extractor☆189Oct 28, 2025Updated 4 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆84Dec 3, 2025Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆100Jun 20, 2025Updated 8 months ago
- Live validation proxy tool for testing web app vulnerabilities☆832Feb 14, 2026Updated 3 weeks ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆261Sep 23, 2025Updated 5 months ago
- using ML models for red teaming☆42Aug 9, 2023Updated 2 years ago
- Yubico OTP validation Slack bot☆10Oct 3, 2025Updated 5 months ago
- A Cybersecurity Generalist LLM (ICLR'26)☆33Feb 9, 2026Updated last month
- ☆375Sep 20, 2025Updated 5 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Create file system symbolic links from low privileged user accounts within PowerShell☆94Jun 20, 2022Updated 3 years ago
- Lightweight LLM Interaction Framework☆407Mar 2, 2026Updated last week
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆195Feb 16, 2026Updated 3 weeks ago