TinderSec / gh-workflow-auditor
Script to audit GitHub Action Workflow files for potential vulnerabilities.
☆153Updated 6 months ago
Alternatives and similar repositories for gh-workflow-auditor:
Users that are interested in gh-workflow-auditor are comparing it to the libraries listed below
- Protect against subdomain takeover☆93Updated 9 months ago
- ☆163Updated 6 months ago
- boostsecurityio/lotp☆112Updated this week
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆196Updated last month
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated this week
- Scans your Github Actions for security issues☆60Updated 3 weeks ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆251Updated this week
- How GitHub Actions workflows can be hacked☆118Updated 6 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated last month
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆269Updated 5 months ago
- Manager of third-party sources of Semgrep rules 🗂☆79Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- ☆182Updated 4 months ago
- ☆93Updated last month
- An AWS IAM policy statement parser and query tool.☆173Updated last year
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- A full insecure kubernetes application for testing security tools☆68Updated last week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆103Updated last year
- find dangling domains in a multi cloud environment☆140Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆114Updated last year
- ☆110Updated last year
- WAF bypass PoC☆46Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆220Updated 4 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆272Updated last month
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated 2 weeks ago
- boostsecurityio/poutine☆258Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆63Updated 9 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆52Updated last month
- Fetch the details of assets hosted on AWS.☆86Updated last year