ghostsecurity / reaperLinks
💀 Don't fear the Reaper 👻
☆715Updated last week
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆462Updated last year
- Pen Test Report Generation and Assessment Collaboration☆585Updated this week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆885Updated 2 weeks ago
- Bitor Scanning Software☆437Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆680Updated 2 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆462Updated last week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 3 months ago
- OWASP Foundation web repository☆600Updated 3 weeks ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆813Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆410Updated 3 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆327Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 3 months ago
- Gram is Klarna's own threat model diagramming tool☆330Updated this week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,012Updated 9 months ago
- ☆380Updated last year
- The Internets #1 Subdomain Takeover Tool☆289Updated 6 months ago
- Open source templates you can use to bootstrap your security programs☆884Updated 6 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆563Updated last month
- ☆314Updated 5 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,203Updated last month
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆737Updated 2 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated this week
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆542Updated 3 weeks ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆444Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆315Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆430Updated last week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆470Updated last week
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆972Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 2 weeks ago