Repositories that contain workflows to bypass authentication, activation, or other mechanisms preventing the usage of specific software.