Raptor turns Claude Code into a general-purpose AI offensive/defensive security agent. By using Claude.md and creating rules, sub-agents, and skills, and orchestrating security tool usage, we configure the agent for adversarial thinking, and perform research or attack/defense operations.
☆1,522Mar 28, 2026Updated this week
Alternatives and similar repositories for raptor
Users that are interested in raptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI agent for autonomous cyber operations☆508Nov 29, 2025Updated 4 months ago
- This is practice VM for malware development☆180Nov 17, 2025Updated 4 months ago
- List of AI Hacking Agents☆205Updated this week
- ☆59Dec 10, 2025Updated 3 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Automatic Exploit Generation with LLMs☆588Jan 30, 2026Updated 2 months ago
- Zero shot vulnerability discovery using LLMs☆2,592Feb 6, 2025Updated last year
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆776Mar 17, 2026Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆93Dec 7, 2025Updated 3 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,212Dec 29, 2025Updated 3 months ago
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆112Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆385Nov 26, 2024Updated last year
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Updated this week
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Cybersecurity AI (CAI), the framework for AI Security☆7,592Updated this week
- ☆15Oct 29, 2024Updated last year
- A Cybersecurity Generalist LLM (ICLR'26)☆36Feb 9, 2026Updated last month
- Live validation proxy tool for testing web app vulnerabilities☆833Updated this week
- SAST + LLM Interprocedural Context Extractor☆193Oct 28, 2025Updated 5 months ago
- Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows☆3,858Mar 24, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Security operations toolkit for AI coding agents. Give Claude Code 25+ skills to catch vulnerabilities, scan containers, detect secrets, …☆82Nov 23, 2025Updated 4 months ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- An AWS IAM Privilege Escalation Path Library☆124Mar 16, 2026Updated 2 weeks ago
- ☆384Sep 20, 2025Updated 6 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆16Oct 9, 2023Updated 2 years ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Nov 3, 2025Updated 4 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,059Mar 10, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆85Dec 3, 2025Updated 3 months ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆101Jun 20, 2025Updated 9 months ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated last year
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,410Jun 24, 2025Updated 9 months ago