offensive-terraform / terraform-aws-ebs-snapshot-publicly-exposed
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
β15Updated 4 years ago
Alternatives and similar repositories for terraform-aws-ebs-snapshot-publicly-exposed:
Users that are interested in terraform-aws-ebs-snapshot-publicly-exposed are comparing it to the libraries listed below
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β72Updated 3 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.β17Updated 4 years ago
- ποΈ STRIDE vs. ASVS equivalence tableβ75Updated 4 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β134Updated 4 years ago
- Pivot into private VPC networks using a VPN connectionβ41Updated 5 years ago
- AWS SSO serverless phishing API.β31Updated 3 years ago
- Updated incident response generator for training classesβ42Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrailβ60Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Traβ¦β19Updated 3 years ago
- β133Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β75Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ63Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Updated 2 years ago
- Kubernetes Security Testing Guideβ26Updated 8 months ago
- Jekyll Files for cloudsecwiki.comβ50Updated 3 years ago
- β32Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.β48Updated 7 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated last year
- Scripts and tools for AWS Pentestβ51Updated 4 years ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projectsβ21Updated this week
- Route53/CloudFront Vulnerability Assessment Utilityβ84Updated last year
- Burp Plugin for Contrast Securityβ16Updated 3 months ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneβ¦β31Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugsβ47Updated last year
- A simple file-based scanner to look for potential AWS access and secret keys in filesβ89Updated 9 months ago
- OWASP Foundation Web Respositoryβ34Updated 4 months ago
- β58Updated last year
- β20Updated 4 years ago