Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. CI/CD Attacks
  3. pwn_jenkins

pwn_jenkins

Python

A collection of notes, scripts, and techniques for exploiting vulnerabilities and attacking Jenkins servers.

GitHubGitHub
2.1k stars325 forks0 contributors

What is pwn_jenkins?

pwn_jenkins is a security research repository focused on attacking Jenkins automation servers. It documents critical vulnerabilities, provides exploitation scripts, and details post-compromise techniques for red teamers and penetration testers. The project serves as a practical guide for assessing and exploiting insecure Jenkins deployments.

Target Audience

Security researchers, penetration testers, and red team operators who need to audit or exploit Jenkins servers in authorized engagements.

Value Proposition

It consolidates scattered Jenkins attack vectors into a single, actionable resource with working exploit code and scripts, saving time for security professionals during assessments.

Overview

Notes about attacking Jenkins servers

Use Cases

Best For

  • Penetration testing Jenkins servers in corporate environments
  • Exploiting specific CVEs like CVE-2024-23897 for arbitrary file reads
  • Post-exploitation activities on compromised Jenkins instances
  • Dumping and decrypting Jenkins credentials offline
  • Learning offensive security techniques against CI/CD infrastructure
  • Red team operations targeting automation servers

Not Ideal For

  • Blue teams seeking detection rules and mitigation strategies for Jenkins attacks
  • Jenkins administrators looking for security hardening guides or best practices
  • Developers building secure Jenkins plugins without a focus on exploitation
  • Educational courses on defensive security for CI/CD pipelines

Pros & Cons

Pros

Comprehensive CVE Coverage

Documents critical vulnerabilities like CVE-2024-23897 and CVE-2019-1003000 with detailed exploitation commands and scripts, saving research time.

Actionable Post-Exploitation Tools

Provides ready-to-use Python scripts for dumping build logs and decrypting secrets offline, as shown in the repository's scripts directory.

Groovy Payload Library

Includes Groovy scripts for command execution and reverse shells, with examples for automating attacks on specific slave nodes.

Practical Hands-On Approach

Emphasizes actionable code over theory, offering clear examples like memory dumping for LDAP credentials and password spraying techniques.

Cons

No Defensive Guidance

Purely offensive; lacks any mitigation strategies, patching advice, or security best practices for securing Jenkins servers.

Assumes Security Expertise

Requires familiarity with penetration testing tools and Jenkins internals; not beginner-friendly, with minimal explanatory context.

Limited to Documented Vulnerabilities

Focuses on known CVEs up to a point; may not cover newer exploits or zero-days, and scripts might need updates for newer Jenkins versions.

Ethical and Legal Risks

Intended for authorized use only; unauthorized application could lead to legal issues, and the README offers no disclaimers on responsible usage.

Frequently Asked Questions

Quick Stats

Stars2,091
Forks325
Contributors0
Open Issues0
Last commit1 year ago
CreatedSince 2018

Tags

#pentest#jenkins#exploit#red-teaming#penetration-testing#offensive-security#post-exploitation#hacking

Built With

B
Bash
P
Python
G
Groovy

Included in

CI/CD Attacks578
Auto-fetched 1 day ago

Related Projects

zizmorzizmor

Static analysis for GitHub Actions

Stars4,261
Forks171
Last commit1 day ago
git-dumpergit-dumper

A tool to dump a git repository from a website

Stars2,506
Forks296
Last commit1 month ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub