ghostsecurity / reaperLinks
π Don't fear the Reaper π»
β543Updated last week
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applicβ¦β450Updated last year
- Pen Test Report Generation and Assessment Collaborationβ531Updated this week
- Bitor Scanning Softwareβ383Updated last month
- Gram is Klarna's own threat model diagramming toolβ320Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbiβ¦β251Updated last month
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/oβ¦β732Updated 2 weeks ago
- β368Updated last year
- GitHub Actions Pipeline Enumeration and Attack Toolβ668Updated last week
- Halberd : Multi-Cloud Agentic Attack Toolβ282Updated this week
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.β370Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threβ¦β651Updated 2 months ago
- Websec interview questions by tib3rius answeredβ309Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for cβ¦β421Updated 5 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β281Updated 4 months ago
- An offensive data enrichment pipelineβ733Updated this week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.β235Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ220Updated 2 weeks ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.β388Updated last week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β149Updated 7 months ago
- Create your own vulnerable by design AWS penetration testing playgroundβ382Updated 2 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.β522Updated 4 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.β942Updated 3 months ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).β382Updated 2 weeks ago
- The Internets #1 Subdomain Takeover Toolβ260Updated 3 weeks ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.β415Updated 8 months ago
- Awesome secure by default libraries to help you eliminate bug classes!β694Updated 2 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiβ171Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITREβ¦β1,163Updated 3 weeks ago
- Generate datasets of cloud audit logs for common attacksβ216Updated 10 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.β285Updated 9 months ago