praetorian-inc / gato
GitHub Actions Pipeline Enumeration and Attack Tool
☆584Updated this week
Alternatives and similar repositories for gato:
Users that are interested in gato are comparing it to the libraries listed below
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆239Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆270Updated 2 weeks ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆436Updated this week
- Websec interview questions by tib3rius answered☆306Updated last year
- ☆289Updated 6 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆189Updated 3 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆226Updated 5 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆622Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 3 months ago
- ☆467Updated 9 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning—On Your Terms. Easily distribute arbit…☆334Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆401Updated 3 weeks ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆172Updated 5 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆367Updated 10 months ago
- Tool for building Kubernetes attack paths☆818Updated this week
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆507Updated this week
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆320Updated 3 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆585Updated 3 months ago
- Kubernetes exploitation tool☆361Updated 6 months ago
- Attack surface detector that identifies endpoints by static analysis☆656Updated this week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆214Updated 2 weeks ago
- boostsecurityio/lotp☆112Updated this week
- boostsecurityio/poutine☆254Updated last week
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,091Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆857Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆367Updated 3 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆256Updated 7 months ago
- Zero-dollar attack surface management tool☆270Updated 10 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆903Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆447Updated 10 months ago