Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.
☆2,106Apr 15, 2026Updated this week
Alternatives and similar repositories for raptor
Users that are interested in raptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI agent for autonomous cyber operations☆514Nov 29, 2025Updated 4 months ago
- Security Research Toolkit — Video and image analysis tool for neural inpainting and AI-generated content detection with SORA signature ex…☆36Mar 13, 2026Updated last month
- This is practice VM for malware development☆180Nov 17, 2025Updated 5 months ago
- Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, …☆110Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,216Dec 29, 2025Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Living off the land searches for explorer and sharepoint☆96Dec 7, 2025Updated 4 months ago
- List of AI Hacking Agents☆219Mar 28, 2026Updated 3 weeks ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆388Nov 26, 2024Updated last year
- Cybersecurity AI (CAI), the framework for AI Security☆8,153Updated this week
- Zero shot vulnerability discovery using LLMs☆2,629Feb 6, 2025Updated last year
- ☆59Dec 10, 2025Updated 4 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 3 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 6 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆57Apr 13, 2026Updated last week
- ☆391Jun 25, 2025Updated 9 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Automatic Exploit Generation with LLMs☆599Jan 30, 2026Updated 2 months ago
- SAST + LLM Interprocedural Context Extractor☆194Oct 28, 2025Updated 5 months ago
- Live validation proxy tool for testing web app vulnerabilities☆848Mar 24, 2026Updated 3 weeks ago
- MCP server for AI-driven security pipelines☆785Apr 9, 2026Updated last week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,066Mar 10, 2026Updated last month
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 7 months ago
- ☆16Jan 9, 2025Updated last year
- Awesome MalDev Links☆57Mar 18, 2026Updated last month
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- Mapping of open-source detection rules and atomic tests.☆206Feb 16, 2026Updated 2 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆114Updated this week
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆259Nov 3, 2025Updated 5 months ago
- # Keylogger-BOF☆46Mar 13, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆166Oct 21, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆413Aug 18, 2025Updated 8 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆287Apr 8, 2026Updated last week
- Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows☆4,557Apr 8, 2026Updated last week
- Lab used for workshop and CTF☆512Feb 3, 2026Updated 2 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,412Jun 24, 2025Updated 9 months ago
- the LLM vulnerability scanner☆7,559Updated this week
- Okta Verify and Okta FastPass Abuse Tool☆342Sep 4, 2024Updated last year