ghostsecurity / reaper
π Don't fear the Reaper π»
β470Updated this week
Alternatives and similar repositories for reaper:
Users that are interested in reaper are comparing it to the libraries listed below
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applicβ¦β446Updated 11 months ago
- Pen Test Report Generation and Assessment Collaborationβ469Updated last week
- Halberd : Multi-Cloud Attack Platformβ250Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbiβ¦β233Updated this week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/oβ¦β665Updated this week
- Gram is Klarna's own threat model diagramming toolβ319Updated last week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Geminiβ160Updated 11 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β272Updated last month
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.β209Updated 6 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.β251Updated this week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.β512Updated 3 weeks ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ216Updated 2 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such β¦β219Updated last month
- An offensive data enrichment pipelineβ668Updated last month
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for cβ¦β405Updated last month
- GitHub Actions Pipeline Enumeration and Attack Toolβ590Updated last week
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.β667Updated 4 months ago
- β363Updated 10 months ago
- Open source templates you can use to bootstrap your security programsβ810Updated 3 weeks ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIsβ72Updated last year
- Websec interview questions by tib3rius answeredβ306Updated last year
- Create your own vulnerable by design AWS penetration testing playgroundβ356Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITREβ¦β1,093Updated last month
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs andβ¦β148Updated 3 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloudβ249Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β257Updated this week
- boostsecurityio/poutineβ258Updated last week
- Galah: An LLM-powered web honeypot.β506Updated 4 months ago