Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)
☆35Jan 25, 2026Updated last month
Alternatives and similar repositories for ActionsTOCTOU
Users that are interested in ActionsTOCTOU are comparing it to the libraries listed below
Sorting:
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆97Jan 28, 2026Updated last month
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆245Dec 8, 2025Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆192Apr 16, 2025Updated 10 months ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- ☆16Jul 17, 2024Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- boostsecurityio/poutine☆367Feb 23, 2026Updated last week
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- ☆65Dec 9, 2021Updated 4 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- ☆40Aug 2, 2024Updated last year
- How GitHub Actions workflows can be hacked☆177Aug 23, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Set of tools to analyze Tinynuke samples☆15Nov 18, 2021Updated 4 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- boostsecurityio/lotp☆139Feb 24, 2026Updated last week
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 9 months ago
- ☆27May 6, 2024Updated last year
- Security tool against dependency typosquatting attacks☆54Feb 25, 2026Updated last week
- An AWS metadata enumeration tool by Plerion☆101Feb 12, 2024Updated 2 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Updated this week
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated last month
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Feb 16, 2024Updated 2 years ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- boostsecurityio/bagel☆79Feb 12, 2026Updated 2 weeks ago
- ☆29May 12, 2025Updated 9 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆482Feb 21, 2026Updated last week
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆26Jan 19, 2022Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Seamless AI Integration into Caido☆42Feb 23, 2026Updated last week
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆67Oct 1, 2022Updated 3 years ago