ghostsecurity / reaperLinks
💀 Don't fear the Reaper 👻
☆694Updated 3 weeks ago
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- Pen Test Report Generation and Assessment Collaboration☆572Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆461Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆837Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆677Updated last month
- Bitor Scanning Software☆429Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆454Updated 2 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated this week
- ☆379Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆403Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,190Updated this week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆257Updated last month
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,007Updated 7 months ago
- Gram is Klarna's own threat model diagramming tool☆327Updated last month
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆556Updated last week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆800Updated 3 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆175Updated 6 months ago
- OWASP Foundation web repository☆433Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆712Updated last month
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆534Updated last week
- ☆314Updated 4 months ago
- Open source templates you can use to bootstrap your security programs☆878Updated 5 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆269Updated 5 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated last month
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆730Updated last month
- The Internets #1 Subdomain Takeover Tool☆285Updated 5 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆307Updated last year
- A repo to conduct vulnerability enrichment.☆692Updated this week
- Websec interview questions by tib3rius answered☆310Updated 2 years ago
- OXO is a security scanning orchestrator for the modern age.☆558Updated this week
- API Security Vulnerability Scanner designed to help you secure your APIs.☆219Updated this week