A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.
☆28Oct 13, 2024Updated last year
Alternatives and similar repositories for gh-hijack-runner
Users that are interested in gh-hijack-runner are comparing it to the libraries listed below
Sorting:
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- ☆49Mar 21, 2023Updated 2 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆316Jan 25, 2026Updated last month
- ☆30Jan 13, 2026Updated last month
- ☆13Jan 30, 2025Updated last year
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆482Updated this week
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- Scan GitHub Actions Workflow logs for IOCs☆16Feb 27, 2026Updated last week
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆18Jan 3, 2026Updated 2 months ago
- ☆40Aug 2, 2024Updated last year
- ☆93Dec 15, 2025Updated 2 months ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- ☆27May 6, 2024Updated last year
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Security tool against dependency typosquatting attacks☆54Feb 25, 2026Updated last week
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆73Oct 22, 2025Updated 4 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆733Sep 17, 2025Updated 5 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆23Apr 11, 2024Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- ☆24Feb 12, 2016Updated 10 years ago
- boostsecurityio/bagel☆79Feb 12, 2026Updated 3 weeks ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- ☆30Jul 29, 2021Updated 4 years ago
- ☆29Jan 31, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- Results from analyzing data gathered from 1.6 billion subdomains☆32Oct 15, 2024Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- boostsecurityio/lotp☆139Updated this week
- Tool to manage user privileges☆31Sep 4, 2019Updated 6 years ago