ghostsecurity / reaperLinks
💀 Don't fear the Reaper 👻
☆600Updated 3 weeks ago
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- Pen Test Report Generation and Assessment Collaboration☆566Updated 2 weeks ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆460Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆823Updated 2 weeks ago
- Bitor Scanning Software☆413Updated 2 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆671Updated 2 months ago
- ☆314Updated 2 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆311Updated last month
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆448Updated last week
- The Internets #1 Subdomain Takeover Tool☆272Updated 4 months ago
- OWASP Foundation web repository☆406Updated this week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 2 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆174Updated 5 months ago
- ☆377Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆263Updated 4 months ago
- Gram is Klarna's own threat model diagramming tool☆325Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,185Updated 4 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆710Updated 2 weeks ago
- Create your own vulnerable by design AWS penetration testing playground☆398Updated last month
- Websec interview questions by tib3rius answered☆311Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆305Updated last week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆791Updated this week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆545Updated 3 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 8 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆153Updated 10 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆377Updated this week
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆439Updated last week
- A repo to conduct vulnerability enrichment.☆685Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆388Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated last week
- The Arcanum Prompt Injection Taxonomy☆270Updated last month