Welcome to Raider’s documentation!¶
Note
This documentation and the entire Raider framework is still work in progress. Many things are not finished, stuff is missing, other stuff is not working as expected, and so on… Meanwhile, read the source code to understand better how Raider works, open Github issues if you find some mistakes, or come talk to us in the community forum.

Raider is a framework designed to test authentication for web applications. While web proxies like ZAProxy and Burpsuite allow authenticated tests, they don’t provide features to test the authentication process itself, i.e. manipulating the relevant input fields to identify broken authentication. Most authentication bugs in the wild have been found by manually testing it or writing custom scripts that replicate the behaviour. Raider aims to make testing easier, by providing the interface to interact with all important elements found in modern authentication systems.
How does Raider work?¶
Raider treats the authentication as a finite state machine. Each authentication step is a different stage, with its own inputs and outputs. Those can be cookies, headers, CSRF tokens, or other pieces of information.
Each application needs its own configuration directory for Raider to work. The configuration is written in Hylang. The language choice was done for multiple reasons, mainly because it’s a Lisp dialect embedded in Python.
Using Lisp was necessarily since sometimes the authentication can get quite complex, and using a static configuration file would’ve not been enough to cover all the details. Lisp makes it easy to combine code and data, which is exactly what was needed here.
By using a real programming language as a configuration file gives
Raider a lot of power, and with great power comes great
responsibility. Theoretically one can write entire malware inside the
application configuration file, which means you should be careful
what’s being executed, and not to use configuration files from
sources you don’t trust. Raider will evaluate everything inside
the .hy
files, which means if you’re not careful you could shoot
yourself in the foot and break something on your system.
Features¶
Raider has the goal to support most of the modern authentication systems, and here are some features that other tools don’t offer:
Unlimited authentication steps
Unlimited inputs/outputs for each step
Ability to conditionally decide the next step
Running arbitrary operations when receiving the response
Easy to write custom operations and plugins
Raider’s philosophy¶
Raider was developed with the following goals:
To abstract authentication concepts using Python objects.
To support most modern web authentication features.
To make it easy to add new features for users.
And if you’re looking at the code and willing to contribute, keep those in mind:
The simpler and cleaner the code, the better.
New features should be implemented as Plugins and Operations if possible.
The hyfiles should stay as minimal as possible, while still allowing the user to get creative. In the future parts of this code could be autogenerated.
User guide¶
Getting started
- Installing Raider
- Architecture
- Tutorials
- Definitions
- Frequently asked questions
- What’s this and why should I care?
- How does it work?
- You’re telling me it’ll evaluate all user input? Isn’t that unsafe?
- How do I run this?
- Do I need to know Python and Hylang in order to use Raider?
- Why Lisp?
- Why is Raider using Hylang?
- Does it work on Windows?
- What about macOS? BSD? etc?
- How can I contribute?
Configuration