☆36Apr 29, 2025Updated 10 months ago
Alternatives and similar repositories for github-oidc-utils
Users that are interested in github-oidc-utils are comparing it to the libraries listed below
Sorting:
- ☆18Jul 30, 2024Updated last year
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 11 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆133Mar 4, 2026Updated 2 weeks ago
- Dataset fingerprinting for AIBOM☆15Updated this week
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Scan GitHub Actions Workflow logs for IOCs☆16Updated this week
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Mar 14, 2026Updated last week
- ☆28Dec 26, 2025Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- ☆49Mar 21, 2023Updated 2 years ago
- SCP management tool☆135Oct 23, 2023Updated 2 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated 3 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆736Mar 5, 2026Updated 2 weeks ago
- Audit your GitHub Actions workflow runs to see exactly which Actions were downloaded☆80Mar 2, 2026Updated 2 weeks ago
- ☆46Nov 7, 2024Updated last year
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Updated this week
- ☆18Feb 2, 2026Updated last month
- ☆14Apr 23, 2019Updated 6 years ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- (D)ocker(F)ile (C)onverter: CLI to convert Dockerfiles to use Chainguard Images and APKs in FROM and RUN lines etc.☆99Feb 11, 2026Updated last month
- boostsecurityio/bagel☆95Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- Command line util for grep.app - Search across a half million git repos☆58Nov 24, 2022Updated 3 years ago