Research on abusing GitLab Runners
☆31Jul 14, 2020Updated 5 years ago
Alternatives and similar repositories for gitlab-runner-research
Users that are interested in gitlab-runner-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Material for HolyJS 2020 Moscow☆12Nov 28, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- Secretsdump C# version only supporting local (live) operation☆56Apr 20, 2025Updated last year
- A demo for React Suspense☆16Jun 18, 2018Updated 7 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆18Aug 9, 2024Updated last year
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- A program for backup & restoration of btrfs subvolumes.☆13Mar 20, 2026Updated last month
- Simple ESP32 ARP network scanner☆10Oct 11, 2025Updated 6 months ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 第 2 章 GitHub Actions の機能解説 - ワークフロー設定ファイルの構文☆12Jan 5, 2023Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- ☆19Dec 18, 2024Updated last year
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- A type safe functional implementation of the hexagonal architecture in typescript☆19Mar 5, 2023Updated 3 years ago
- ☆18Dec 21, 2022Updated 3 years ago
- List of fresh DNS resolvers updated daily☆106Feb 9, 2023Updated 3 years ago
- A 3D-printable robot design.☆12Apr 4, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple Nmap XML parsing script. Doesn't do anything fancy☆22Oct 22, 2020Updated 5 years ago
- ☆13Mar 24, 2026Updated last month
- Template for Linux Kernel development on Apple Silicon (aarch64) using VS Code☆18Mar 17, 2024Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆11Apr 22, 2026Updated last week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆293Mar 5, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Apr 15, 2026Updated 2 weeks ago
- ☆39Oct 16, 2023Updated 2 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- ☆28Aug 13, 2025Updated 8 months ago
- ☆14Apr 8, 2022Updated 4 years ago
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year