ghostsecurity / reaper
π Don't fear the Reaper π»
β390Updated this week
Related projects β
Alternatives and complementary repositories for reaper
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applicβ¦β448Updated 7 months ago
- Pen Test Report Generation and Assessment Collaborationβ443Updated this week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbiβ¦β207Updated 2 months ago
- Gram is Klarna's own threat model diagramming toolβ282Updated this week
- Halberd : Multi-Cloud Attack Toolβ208Updated this week
- Create your own vulnerable by design AWS penetration testing playgroundβ331Updated 5 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β253Updated last week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiβ149Updated 8 months ago
- GitHub Actions Pipeline Enumeration and Attack Toolβ570Updated 3 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β140Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloudβ244Updated last week
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targetsβ181Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β198Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ196Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.β489Updated 3 weeks ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIsβ69Updated 8 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threβ¦β532Updated 2 weeks ago
- HASH (HTTP Agnostic Software Honeypot)β128Updated 6 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for cβ¦β381Updated 3 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.β266Updated 2 months ago
- β356Updated 7 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CKβ¦β161Updated last month
- Octoscan is a static vulnerability scanner for GitHub action workflows.β171Updated last week
- boostsecurityio/poutineβ231Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.β275Updated 6 months ago
- Websec interview questions by tib3rius answeredβ303Updated last year
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).β342Updated this week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guiβ¦β211Updated 2 years ago
- β152Updated 2 months ago
- Generate datasets of cloud audit logs for common attacksβ184Updated 3 months ago