bin3xish477 / ghast
GHAST (GitHub Actions Static Analysis Tool) is a tool to analyze the security posture of your GitHub Actions and its surrounding environment for common security vulnerabilities or missing security configuration.
☆17Updated last year
Alternatives and similar repositories for ghast:
Users that are interested in ghast are comparing it to the libraries listed below
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated last month
- InfoSec OpenAI Examples☆19Updated last year
- ☆55Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- ☆57Updated last year
- Virtual Security Operations Center☆50Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- ☆41Updated 2 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- A simple web app to get the latest EPSS data for a CVE ID☆10Updated 3 weeks ago
- ☆35Updated 3 weeks ago
- ☆46Updated 10 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆46Updated 8 months ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆17Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated last month
- 📚A curated list of product security resources.☆19Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- ☆110Updated last year
- WAF bypass PoC☆47Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆106Updated 5 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 10 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 9 months ago
- ☆16Updated 5 months ago