ghostsecurity / reaperLinks
π Don't fear the Reaper π»
β522Updated 2 weeks ago
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applicβ¦β450Updated last year
- Pen Test Report Generation and Assessment Collaborationβ525Updated this week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbiβ¦β249Updated 2 weeks ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/oβ¦β731Updated 2 weeks ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threβ¦β646Updated 2 months ago
- Halberd : Multi-Cloud Attack Toolβ278Updated 3 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metricsβ199Updated this week
- β368Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β149Updated 6 months ago
- β259Updated 6 months ago
- Gram is Klarna's own threat model diagramming toolβ319Updated 2 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiβ169Updated last month
- The Internets #1 Subdomain Takeover Toolβ254Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β280Updated 3 months ago
- Bitor Scanning Softwareβ380Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playgroundβ378Updated last month
- boostsecurityio/poutineβ279Updated this week
- GitHub Actions Pipeline Enumeration and Attack Toolβ647Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.β518Updated 3 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.β941Updated 2 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for cβ¦β417Updated 4 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.β358Updated last week
- Websec interview questions by tib3rius answeredβ309Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.β700Updated 7 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β298Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlβ¦β298Updated last week
- Open source templates you can use to bootstrap your security programsβ851Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!β691Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloudβ248Updated 6 months ago
- An offensive data enrichment pipelineβ680Updated last month