Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them
☆19Apr 23, 2026Updated this week
Alternatives and similar repositories for pipeleek
Users that are interested in pipeleek are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 10 months ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- ☆16May 30, 2025Updated 10 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 3 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- ADSI based SA tool☆17Apr 9, 2022Updated 4 years ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in full‑…☆103Mar 10, 2026Updated last month
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆104Apr 4, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OWASP Foundation Web Respository☆11Apr 16, 2026Updated 2 weeks ago
- ☆15Mar 30, 2022Updated 4 years ago
- An Arduino sketch for the Adafruit SCD4X and SCD-30 CO2 sensor running on an ESP32 with an http server.☆19May 31, 2025Updated 11 months ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆25Feb 18, 2025Updated last year
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- ☆14Jul 29, 2024Updated last year
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆20Updated this week
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- WMI SA stuffs☆30Apr 18, 2022Updated 4 years ago
- A simple tool for enumerating dynamic endpoints on a DCE/RPC remote or local endpoint mapper.☆15Oct 9, 2020Updated 5 years ago
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 2 months ago
- ☆77Apr 8, 2026Updated 3 weeks ago
- ☆22Mar 19, 2026Updated last month
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The Singularity Community Catalog of Singularity* recipe files.☆11Oct 27, 2025Updated 6 months ago
- An advanced library for protecting/obfuscating kernel drivers using the C++ 17 standard.☆33Mar 9, 2026Updated last month
- Lnk crafting and research tools☆164Mar 4, 2026Updated last month
- Automated prompt injection testing framework for LLM-integrated applications with dual-LLM architecture.☆188Mar 14, 2026Updated last month
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆92May 24, 2025Updated 11 months ago
- Tool for MSSQL relay audit and abuse☆59Dec 17, 2024Updated last year
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago