GitHub Actions Cache Native Malware - for Educational and Research Purposes only.
☆146Jan 28, 2026Updated 3 months ago
Alternatives and similar repositories for Cacheract
Users that are interested in Cacheract are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆41Jan 25, 2026Updated 3 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆529Updated this week
- How GitHub Actions workflows can be hacked☆181Aug 23, 2024Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- Supply Chain Security Research - Living Off The Pipeline tools☆150Apr 14, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- ☆192Apr 16, 2025Updated last year
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆266Mar 30, 2026Updated last month
- poutine, a supply chain vulnerability scanner for build pipelines☆446Updated this week
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Data about all known supply-chain attacks through history☆66May 28, 2025Updated 11 months ago
- A collection of position independent coding resources☆114Nov 15, 2025Updated 5 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- ☆13Feb 4, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆356Apr 21, 2026Updated 2 weeks ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆94Oct 14, 2025Updated 6 months ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- ☆14Jan 8, 2026Updated 4 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆63Feb 5, 2025Updated last year
- Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages - in seconds.☆103Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- ☆46Nov 7, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- ☆18Feb 2, 2026Updated 3 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆210Dec 25, 2024Updated last year
- A tool for folks who `git clone` first and ask questions later☆68Apr 15, 2026Updated 3 weeks ago
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆17Jul 31, 2021Updated 4 years ago
- ☆50Jun 4, 2025Updated 11 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆192Jan 17, 2026Updated 3 months ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated last year
- This repository contains a number of insecure self-hosted applications that allows interested security engineers to test vulnerabilities …☆26Apr 30, 2025Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆152Aug 28, 2024Updated last year