praetorian-inc / gatoView external linksLinks
GitHub Actions Pipeline Enumeration and Attack Tool
☆727Sep 17, 2025Updated 5 months ago
Alternatives and similar repositories for gato
Users that are interested in gato are comparing it to the libraries listed below
Sorting:
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆480Jan 5, 2026Updated last month
- ☆192Apr 16, 2025Updated 10 months ago
- Azure DevOps Services Attack Toolkit☆313Mar 15, 2025Updated 11 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Jan 25, 2026Updated 3 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆243Dec 8, 2025Updated 2 months ago
- Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history.☆2,288Nov 14, 2025Updated 3 months ago
- ☆567Mar 28, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,516Feb 5, 2026Updated last week
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- ☆104Oct 27, 2022Updated 3 years ago
- boostsecurityio/lotp☆138Jan 25, 2026Updated 3 weeks ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆601Dec 9, 2025Updated 2 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆603Nov 28, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Tool for building Kubernetes attack paths☆940Updated this week
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆998Feb 10, 2026Updated last week
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆482Oct 14, 2022Updated 3 years ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- An offensive data enrichment pipeline☆914Updated this week
- Standalone utility for service discovery on open ports!☆690Jan 13, 2026Updated last month
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Feb 14, 2023Updated 3 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆282Nov 27, 2025Updated 2 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,254Mar 19, 2025Updated 10 months ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆778Oct 16, 2025Updated 4 months ago
- Azure JWT Token Manipulation Toolset☆713Dec 6, 2024Updated last year
- Azure Security Resources and Notes☆1,707Feb 2, 2026Updated 2 weeks ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆859Feb 3, 2024Updated 2 years ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆485Updated this week
- Black box fuzzer for web applications☆437Jul 20, 2025Updated 6 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago