Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.
☆2,497May 9, 2026Updated this week
Alternatives and similar repositories for raptor
Users that are interested in raptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI agent for autonomous cyber operations☆523Nov 29, 2025Updated 5 months ago
- Security Research Toolkit — Video and image analysis tool for neural inpainting and AI-generated content detection with SORA signature ex…☆36Mar 13, 2026Updated last month
- List of AI Hacking Agents☆227Apr 27, 2026Updated last week
- This is practice VM for malware development☆180Nov 17, 2025Updated 5 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,219Dec 29, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- MCP server for AI-driven security pipelines☆786Apr 9, 2026Updated last month
- Cybersecurity AI (CAI), the framework for AI Security☆8,447Apr 20, 2026Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆97Dec 7, 2025Updated 5 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,075Apr 27, 2026Updated last week
- Zero shot vulnerability discovery using LLMs☆2,645Feb 6, 2025Updated last year
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆386Nov 26, 2024Updated last year
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆82Apr 29, 2026Updated last week
- ☆59Dec 10, 2025Updated 4 months ago
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Lab used for workshop and CTF☆515Feb 3, 2026Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 4 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆42Oct 14, 2025Updated 6 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 months ago
- the LLM vulnerability scanner☆7,756Updated this week
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆94Oct 14, 2025Updated 6 months ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆63Apr 29, 2026Updated last week
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Automatic Exploit Generation with LLMs☆608Jan 30, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆400Jun 25, 2025Updated 10 months ago
- SAST + LLM Interprocedural Context Extractor☆196Oct 28, 2025Updated 6 months ago
- ☆79Apr 6, 2026Updated last month
- Live validation proxy tool for testing web app vulnerabilities☆854Mar 24, 2026Updated last month
- Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows