GitHub Actions Pipeline Enumeration and Attack Tool
☆739Mar 26, 2026Updated this week
Alternatives and similar repositories for gato
Users that are interested in gato are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆495Mar 6, 2026Updated 3 weeks ago
- ☆192Apr 16, 2025Updated 11 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆249Dec 8, 2025Updated 3 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆348Mar 10, 2026Updated 2 weeks ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,316Feb 21, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated last year
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- boostsecurityio/lotp☆147Mar 3, 2026Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆290May 16, 2025Updated 10 months ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,567Feb 5, 2026Updated last month
- Tool for building Kubernetes attack paths☆956Updated this week
- ☆568Mar 28, 2024Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Granular, Actionable Adversary Emulation for the Cloud☆2,286Updated this week
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆578Feb 12, 2026Updated last month
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆1,014Updated this week
- ☆102Oct 27, 2022Updated 3 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated 3 weeks ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Oct 13, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆611Nov 28, 2024Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆617Dec 9, 2025Updated 3 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- Standalone utility for service discovery on open ports!☆748Jan 13, 2026Updated 2 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,375Mar 9, 2026Updated 3 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆497Jun 27, 2025Updated 9 months ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- How GitHub Actions workflows can be hacked☆181Aug 23, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆787Mar 19, 2026Updated last week
- An offensive data enrichment pipeline☆944Mar 19, 2026Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Aug 28, 2024Updated last year
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆646Nov 21, 2019Updated 6 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆400Feb 9, 2026Updated last month