offensive-terraform / terraform-aws-ebs-snapshot-publicly-exposedView external linksLinks
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
☆14Sep 18, 2020Updated 5 years ago
Alternatives and similar repositories for terraform-aws-ebs-snapshot-publicly-exposed
Users that are interested in terraform-aws-ebs-snapshot-publicly-exposed are comparing it to the libraries listed below
Sorting:
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- ☆11Apr 10, 2021Updated 4 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- ☆16Dec 8, 2022Updated 3 years ago
- An industrial strength, best practice reference architecture showing how to prevent credential sprawl with Vault on AWS☆18Jun 18, 2017Updated 8 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Sep 27, 2020Updated 5 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆41Feb 8, 2026Updated last week
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- ☆101Feb 2, 2026Updated 2 weeks ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆113Feb 6, 2026Updated last week
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆14Jul 22, 2025Updated 6 months ago
- A Collection of Awesome Vibe Coding Tools☆22Apr 19, 2025Updated 9 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆13Jun 26, 2025Updated 7 months ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Holds and organizes all past, present, and future presentations at the meetup☆41Jul 15, 2020Updated 5 years ago
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆12Sep 4, 2025Updated 5 months ago
- Some quines in the Go programming language☆15Mar 8, 2023Updated 2 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Apr 22, 2017Updated 8 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago
- Python script to create simple posters, using simple phrases and background images.☆11Mar 19, 2015Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Node bindings for Castle☆13Jan 26, 2026Updated 3 weeks ago
- Docling simplifies document processing, parsing diverse formats — including advanced PDF understanding — and providing seamless integrati…☆16Feb 9, 2026Updated last week
- A repository of remark/rehype, Zod, Astro plugins and more☆15Feb 8, 2026Updated last week
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Before moving to a framework, it’s important to learn some of the key concepts in JavaScript. We have prepared a curriculum for young dev…☆12Jan 13, 2020Updated 6 years ago