praetorian-inc / gatoLinks
GitHub Actions Pipeline Enumeration and Attack Tool
☆706Updated this week
Alternatives and similar repositories for gato
Users that are interested in gato are comparing it to the libraries listed below
Sorting:
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆424Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆299Updated last month
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆220Updated 5 months ago
- ☆314Updated 2 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆541Updated 7 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆262Updated 4 months ago
- boostsecurityio/lotp☆133Updated 5 months ago
- Awesome secure by default libraries to help you eliminate bug classes!☆700Updated 4 months ago
- Gram is Klarna's own threat model diagramming tool☆325Updated last month
- Attack surface detector that identifies endpoints by static analysis☆739Updated this week
- 💀 Don't fear the Reaper 👻☆592Updated this week
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,230Updated last month
- Websec interview questions by tib3rius answered☆311Updated last year
- ☆190Updated 5 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆714Updated last month
- boostsecurityio/poutine☆320Updated 2 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆232Updated 7 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆400Updated last year
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆973Updated 3 weeks ago
- Tool for building Kubernetes attack paths☆910Updated this week
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆226Updated 3 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated last week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆213Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆301Updated last month
- Proof of concept code for Datadog Security Labs referenced exploits.☆444Updated last month
- CI/CD Security Analyzer☆671Updated 6 months ago
- How GitHub Actions workflows can be hacked☆166Updated last year
- Kubernetes exploitation tool☆363Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆398Updated 3 weeks ago