A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.
☆28Oct 13, 2024Updated last year
Alternatives and similar repositories for gh-hijack-runner
Users that are interested in gh-hijack-runner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆36Jan 25, 2026Updated 2 months ago
- ☆11Dec 19, 2024Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆348Mar 10, 2026Updated 2 weeks ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆495Mar 6, 2026Updated 2 weeks ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆18Jun 11, 2024Updated last year
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- Scan GitHub Actions Workflow logs for IOCs☆16Mar 16, 2026Updated last week
- Security tool against dependency typosquatting attacks☆55Mar 17, 2026Updated last week
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- ☆30Jan 13, 2026Updated 2 months ago
- ☆49Mar 21, 2023Updated 3 years ago
- ☆40Aug 2, 2024Updated last year
- ☆91Dec 15, 2025Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated 2 weeks ago
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆736Mar 5, 2026Updated 3 weeks ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Updated this week
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆249Dec 8, 2025Updated 3 months ago
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- ☆15Jun 26, 2025Updated 9 months ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 9 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆73Oct 22, 2025Updated 5 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- ☆36Apr 29, 2025Updated 10 months ago
- JSBerg is a fast and efficient URL scraper that extracts links, JavaScript files, CSS files, images, and inline URLs from a list of websi…☆23Mar 19, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- ☆192Apr 16, 2025Updated 11 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- boostsecurityio/bagel☆100Updated this week
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago