Frichetten / gitlab-runner-researchLinks
Research on abusing GitLab Runners
☆29Updated 5 years ago
Alternatives and similar repositories for gitlab-runner-research
Users that are interested in gitlab-runner-research are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Notification webhook for GoPhish☆57Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 5 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆23Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Updated 2 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- ☆19Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- exfiltration/infiltration toolkit☆49Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- A simple way to exfiltrate data using spotify API☆19Updated last week
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- ☆94Updated 3 years ago
- ☆20Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 3 years ago
- ☆54Updated 4 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆43Updated 6 months ago
- ☆60Updated 2 years ago
- ☆30Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- ☆59Updated 2 years ago