offensive-terraform / terraform-aws-ebs-snapshot-publicly-exposed
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
☆15Updated 4 years ago
Alternatives and similar repositories for terraform-aws-ebs-snapshot-publicly-exposed:
Users that are interested in terraform-aws-ebs-snapshot-publicly-exposed are comparing it to the libraries listed below
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 2 years ago
- AWS SSO serverless phishing API.☆31Updated 3 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆73Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆17Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- ☆34Updated 4 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 4 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- ☆14Updated 2 years ago
- ☆28Updated 8 years ago
- ☆58Updated last year
- Updated incident response generator for training classes☆43Updated 3 years ago
- ☆133Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- ☆63Updated 2 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Updated 3 years ago
- ☆36Updated 3 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 4 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Updated 4 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Burp Extension for AWS Signing☆87Updated last month
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 3 years ago
- Kubernetes Security Testing Guide☆26Updated 9 months ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago