ghostsecurity / reaper
π Don't fear the Reaper π»
β508Updated last week
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applicβ¦β449Updated last year
- Pen Test Report Generation and Assessment Collaborationβ520Updated last week
- Halberd : Multi-Cloud Attack Toolβ273Updated this week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/oβ¦β722Updated last week
- Bitor Scanning Softwareβ376Updated last month
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbiβ¦β245Updated last month
- Gram is Klarna's own threat model diagramming toolβ320Updated 2 weeks ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.β320Updated last week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.β515Updated 2 months ago
- Awesome secure by default libraries to help you eliminate bug classes!β690Updated 3 weeks ago
- The Internets #1 Subdomain Takeover Toolβ249Updated 4 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiβ168Updated 2 weeks ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β278Updated 3 months ago
- Websec interview questions by tib3rius answeredβ308Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for cβ¦β411Updated 3 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.β332Updated 3 weeks ago
- β259Updated 5 months ago
- Check subdomains for subdomain takeovers and other DNS tomfooleryβ336Updated 2 weeks ago
- This repo contains IOC, malware and malware analysis associated with Public cloudβ249Updated 6 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.β924Updated this week
- β367Updated last year
- β180Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ218Updated 3 weeks ago
- boostsecurityio/poutineβ267Updated this week
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β148Updated 5 months ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, iβ¦β490Updated this week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such β¦β226Updated 3 months ago
- Create your own vulnerable by design AWS penetration testing playgroundβ372Updated 3 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Toolβ639Updated last month
- OXO is a security scanning orchestrator for the modern age.β550Updated this week