TinderSec / gh-workflow-auditor
Script to audit GitHub Action Workflow files for potential vulnerabilities.
☆154Updated 7 months ago
Alternatives and similar repositories for gh-workflow-auditor:
Users that are interested in gh-workflow-auditor are comparing it to the libraries listed below
- Protect against subdomain takeover☆93Updated 10 months ago
- ☆165Updated 7 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 2 weeks ago
- boostsecurityio/lotp☆121Updated this week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆103Updated 2 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Scans your Github Actions for security issues☆64Updated last month
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆205Updated this week
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆270Updated 6 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆116Updated last year
- An AWS IAM policy statement parser and query tool.☆175Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆103Updated last year
- ☆188Updated 5 months ago
- ☆110Updated last year
- How GitHub Actions workflows can be hacked☆150Updated 7 months ago
- ☆124Updated 9 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- ☆48Updated 2 years ago
- WAF bypass PoC☆47Updated last year
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆269Updated this week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆224Updated 5 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆101Updated 4 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆113Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆217Updated last week
- find dangling domains in a multi cloud environment☆141Updated last week
- ☆94Updated 2 months ago
- An AWS metadata enumeration tool by Plerion☆96Updated last year
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆276Updated 2 months ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 8 months ago