ghostsecurity / reaper
💀 Don't fear the Reaper 👻
☆500Updated this week
Alternatives and similar repositories for reaper:
Users that are interested in reaper are comparing it to the libraries listed below
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- Pen Test Report Generation and Assessment Collaboration☆512Updated last month
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆708Updated 2 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆243Updated last month
- ☆366Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆516Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆193Updated this week
- Halberd : Multi-Cloud Attack Platform☆269Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆277Updated 2 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆270Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆366Updated 3 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆686Updated 6 months ago
- Gram is Klarna's own threat model diagramming tool☆320Updated last month
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆225Updated 2 months ago
- Bitor Scanning Software☆369Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆256Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,116Updated last week
- The Internets #1 Subdomain Takeover Tool☆246Updated 3 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 5 months ago
- Websec interview questions by tib3rius answered☆307Updated last year
- Open source templates you can use to bootstrap your security programs☆839Updated 3 weeks ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆481Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆279Updated this week
- ☆258Updated 4 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆182Updated 7 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆148Updated 5 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆630Updated 10 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆222Updated 7 months ago
- ☆479Updated 11 months ago