praetorian-inc / gato
GitHub Actions Pipeline Enumeration and Attack Tool
☆608Updated this week
Alternatives and similar repositories for gato:
Users that are interested in gato are comparing it to the libraries listed below
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆262Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆273Updated last month
- ☆290Updated 7 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆200Updated 2 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆238Updated last week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆258Updated 2 weeks ago
- Attack surface detector that identifies endpoints by static analysis☆677Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆405Updated 2 months ago
- Kubernetes exploitation tool☆361Updated 8 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,119Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆616Updated 2 weeks ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆285Updated 11 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆447Updated last year
- boostsecurityio/lotp☆119Updated 2 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆863Updated last year
- ☆475Updated 11 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆115Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated 2 weeks ago
- Websec interview questions by tib3rius answered☆307Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆675Updated 5 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆515Updated last month
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆269Updated 6 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆377Updated 11 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆629Updated last year
- boostsecurityio/poutine☆261Updated last month
- How GitHub Actions workflows can be hacked☆148Updated 7 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆421Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆494Updated last year
- ☆175Updated 4 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆186Updated 3 months ago