TinderSec / gh-workflow-auditor
Script to audit GitHub Action Workflow files for potential vulnerabilities.
☆153Updated 6 months ago
Alternatives and similar repositories for gh-workflow-auditor:
Users that are interested in gh-workflow-auditor are comparing it to the libraries listed below
- Protect against subdomain takeover☆93Updated 9 months ago
- ☆163Updated 6 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆268Updated 6 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated last month
- boostsecurityio/lotp☆115Updated last week
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last week
- ☆184Updated 4 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆222Updated 4 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆198Updated last month
- Scans your Github Actions for security issues☆61Updated 3 weeks ago
- How GitHub Actions workflows can be hacked☆125Updated 6 months ago
- ☆47Updated last year
- An AWS IAM policy statement parser and query tool.☆174Updated last year
- A tool for preventing the installation of malicious PyPI and npm packages☆128Updated last week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- Cloud agnostic IAM permissions enumerator☆140Updated 6 months ago
- ☆110Updated last year
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆254Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆114Updated last year
- find dangling domains in a multi cloud environment☆140Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆103Updated last year
- ☆124Updated 8 months ago
- Manager of third-party sources of Semgrep rules 🗂☆80Updated 7 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- S3 Account Search☆269Updated 5 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆272Updated last month
- A full insecure kubernetes application for testing security tools☆70Updated this week
- WAF bypass PoC☆46Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago