Research on abusing GitLab Runners
☆31Jul 14, 2020Updated 5 years ago
Alternatives and similar repositories for gitlab-runner-research
Users that are interested in gitlab-runner-research are comparing it to the libraries listed below
Sorting:
- ☆43Apr 2, 2020Updated 5 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆21Oct 22, 2020Updated 5 years ago
- karma WiFi attack implementation☆56Oct 23, 2024Updated last year
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- ☆29Oct 15, 2023Updated 2 years ago
- ☆10Updated this week
- Laravel RCE exploit. CVE-2018-15133☆34Mar 22, 2022Updated 3 years ago
- ☆36Oct 16, 2023Updated 2 years ago
- 1C Exploit Kit☆78Dec 8, 2021Updated 4 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Jan 26, 2026Updated last month
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- User manager for PureFTPd allows administrators to easily create, change, or delete 'virtual' PureFTPd users.☆10Jun 18, 2023Updated 2 years ago
- Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector.☆13Apr 17, 2018Updated 7 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆15Sep 4, 2024Updated last year
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆362Jan 29, 2026Updated last month
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- Ruby implementation of CIEDE2000 color distance formula☆10Dec 19, 2025Updated 2 months ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago