Live validation proxy tool for testing web app vulnerabilities
β831Feb 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for reaper
Users that are interested in reaper are comparing it to the libraries listed below
Sorting:
- Automated web vulnerability scanning with LLM agentsβ451Jun 18, 2025Updated 8 months ago
- π€ A GitHub action that leverages fabric patterns through an agent-based approachβ34Jan 4, 2025Updated last year
- PII detection platform, leveraging human-in-the-loop AIβ54Nov 29, 2024Updated last year
- Zero shot vulnerability discovery using LLMsβ2,506Feb 6, 2025Updated last year
- A research project to add some brrrrrr to Burpβ207Feb 16, 2026Updated last week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITREβ¦β1,205Dec 29, 2025Updated 2 months ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.β1,105Feb 23, 2026Updated last week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- β86Feb 4, 2026Updated 3 weeks ago
- Automating situational awareness for cloud penetration tests.β2,295Feb 21, 2026Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applicβ¦β463Mar 28, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024β36Sep 30, 2024Updated last year
- A source code static analysis platform for AppSec enthusiasts.β270Dec 8, 2025Updated 2 months ago
- An offensive data enrichment pipelineβ919Updated this week
- Abuse trust-boundaries to bypass firewalls and network controlsβ390Jul 24, 2025Updated 7 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is deβ¦β817Feb 17, 2025Updated last year
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbitβ¦β724Dec 26, 2025Updated 2 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.β723Updated this week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such β¦β235Feb 6, 2025Updated last year
- Open source templates you can use to bootstrap your security programsβ890Dec 28, 2025Updated 2 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threaβ¦β1,402Jun 24, 2025Updated 8 months ago
- β20Apr 10, 2025Updated 10 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )β225Sep 4, 2024Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.β180Dec 22, 2025Updated 2 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discoveryβ383Nov 26, 2024Updated last year
- Azure DevOps Services Attack Toolkitβ314Mar 15, 2025Updated 11 months ago
- Halberd : Multi-Cloud Agentic Attack Toolβ334Jan 12, 2026Updated last month
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/oβ¦β898Feb 23, 2026Updated last week
- β370Jun 25, 2025Updated 8 months ago
- Mapping of open-source detection rules and atomic tests.β201Feb 16, 2026Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScriptβ1,771May 22, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environmentβ33Oct 14, 2024Updated last year
- CT Log Scannerβ517Dec 26, 2025Updated 2 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.β282Sep 11, 2025Updated 5 months ago
- πΈοΈ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. πΈοΈβ227May 22, 2023Updated 2 years ago
- Agentic Workflows Made Simpleβ161Mar 12, 2025Updated 11 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ2,266Feb 13, 2026Updated 2 weeks ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for cβ¦β438Dec 30, 2025Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clouβ¦β2,802Sep 17, 2024Updated last year