synacktiv / octoscanLinks
Octoscan is a static vulnerability scanner for GitHub action workflows.
☆240Updated last month
Alternatives and similar repositories for octoscan
Users that are interested in octoscan are comparing it to the libraries listed below
Sorting:
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆471Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Updated 3 months ago
- boostsecurityio/lotp☆137Updated 2 months ago
- ☆193Updated 8 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆120Updated 2 years ago
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆155Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 3 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆275Updated 7 months ago
- How GitHub Actions workflows can be hacked☆174Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆109Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated last month
- Scans your Github Actions for security issues☆88Updated 2 weeks ago
- A web CTF for training developers in bug hunting and secure coding!☆100Updated last year
- boostsecurityio/poutine☆354Updated this week
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆212Updated this week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 11 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 11 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆136Updated 3 weeks ago
- ☆314Updated 6 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- Protect against subdomain takeover☆95Updated 5 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Updated 4 months ago
- Tools to assess DNS security.☆153Updated last year
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- An AWS metadata enumeration tool by Plerion☆101Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- 🔍A cutting edge context aware GraphQL API fuzzing tool!☆156Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆59Updated 11 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆115Updated 8 months ago