gadievron / raptorView external linksLinks
Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.
☆1,074Feb 4, 2026Updated last week
Alternatives and similar repositories for raptor
Users that are interested in raptor are comparing it to the libraries listed below
Sorting:
- Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, …☆49Nov 23, 2025Updated 2 months ago
- AI agent for autonomous cyber operations☆474Nov 29, 2025Updated 2 months ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- This is practice VM for malware development☆179Nov 17, 2025Updated 2 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Sep 11, 2025Updated 5 months ago
- ☆59Dec 10, 2025Updated 2 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆39Oct 14, 2025Updated 4 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆40Feb 9, 2026Updated last week
- Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing.☆233Feb 9, 2026Updated last week
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- Zero shot vulnerability discovery using LLMs☆2,497Feb 6, 2025Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆13Oct 29, 2024Updated last year
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Dec 3, 2025Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆92Dec 7, 2025Updated 2 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆382Nov 26, 2024Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆54Jan 1, 2026Updated last month
- Yubico OTP validation Slack bot☆10Oct 3, 2025Updated 4 months ago
- using ML models for red teaming☆45Aug 9, 2023Updated 2 years ago
- ☆52Dec 19, 2025Updated last month
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆699Updated this week
- Create file system symbolic links from low privileged user accounts within PowerShell☆95Jun 20, 2022Updated 3 years ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- Live validation proxy tool for testing web app vulnerabilities☆823Updated this week
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- A repository of credential stealer formats☆243Jun 10, 2025Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated 9 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆259Nov 3, 2025Updated 3 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆57Oct 23, 2024Updated last year
- Okta Verify and Okta FastPass Abuse Tool☆339Sep 4, 2024Updated last year
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,404Jun 24, 2025Updated 7 months ago
- ☆190Nov 21, 2024Updated last year
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago