synacktiv / octoscan
Octoscan is a static vulnerability scanner for GitHub action workflows.
☆188Updated last week
Alternatives and similar repositories for octoscan:
Users that are interested in octoscan are comparing it to the libraries listed below
- boostsecurityio/lotp☆111Updated last month
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆266Updated 2 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆233Updated this week
- ☆161Updated 4 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆101Updated 11 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆223Updated 4 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆120Updated last month
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆153Updated 5 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated last month
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆113Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 2 months ago
- Protect against subdomain takeover☆92Updated 8 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆95Updated 2 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆50Updated this week
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 2 weeks ago
- How GitHub Actions workflows can be hacked☆117Updated 5 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆134Updated 3 weeks ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆154Updated 4 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆153Updated 2 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆102Updated 3 weeks ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆254Updated 7 months ago
- ☆171Updated 2 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆580Updated 5 months ago
- boostsecurityio/poutine☆244Updated 3 weeks ago
- Identify hardcoded secrets in static structured text (version 2)☆90Updated last week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆183Updated 4 months ago
- Dredging up secrets from the depths of the file system☆118Updated 2 months ago
- ☆293Updated 5 months ago