PaloAltoNetworks / upload-secure-artifactView external linksLinks
This GitHub Action scans artifacts for secrets using gitleaks before uploading them.
☆43Dec 6, 2025Updated 2 months ago
Alternatives and similar repositories for upload-secure-artifact
Users that are interested in upload-secure-artifact are comparing it to the libraries listed below
Sorting:
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆14Jan 8, 2026Updated last month
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆92Jan 28, 2026Updated 2 weeks ago
- ☆46Nov 7, 2024Updated last year
- Landing page for MAEC docs☆22Oct 22, 2022Updated 3 years ago
- ☆29Jul 24, 2025Updated 6 months ago
- CVE-2023-1671-POC, based on dnslog platform☆17Apr 26, 2023Updated 2 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆24Nov 20, 2025Updated 2 months ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- ☆26Aug 6, 2021Updated 4 years ago
- ☆23Sep 20, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- ☆27Oct 1, 2025Updated 4 months ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- A sort of a toolkit to decrypt Dropbox Windows DBX files☆31Apr 30, 2017Updated 8 years ago
- GKE CIS 1.1.0 Benchmark InSpec Profile☆25Sep 7, 2021Updated 4 years ago
- ☆30Jan 13, 2026Updated last month
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Jan 30, 2026Updated 2 weeks ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆243Dec 8, 2025Updated 2 months ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Updated this week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last week
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- ☆11Dec 14, 2016Updated 9 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- ☆17Feb 3, 2026Updated last week
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Primarily aimed at replicating files that cannot be directly copied due to being in use.☆11Apr 22, 2024Updated last year
- A clone of FD (File & Directory tool) by T.Shirai☆16Jan 29, 2014Updated 12 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago