Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.
-
Updated
Sep 19, 2020 - HCL
Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy to an IAM role.
Offensive Terraform module which creates RDS database from a publicly exposed RDS snapshot in attacker's AWS account. After that, attacker can connect to RDS database and inspect it.
Offensive Terraform module which creates Lambda function with existing IAM role. The module invokes it automatically to exfiltrate AWS temporary credential from environment variables and send it back with response.
Offensive Terraform module which takes over a subdomain which has a CNAME record pointing to non-existing S3 bucket in target's Route53. The module creates a S3 bucket with a name as subdomain in the specific AWS region that CNAME record is pointing to. Also, it uploads a simple web page with "404 Page Not Found" text.
Offensive Terraform module which creates IAM user, access key then attaches managed IAM Policy to an IAM user.
Offensive Terraform module which creates EC2 instance and exfiltrate credential from Instance metadata to external URL.
Add a description, image, and links to the offensiveterraform topic page so that developers can more easily learn about it.
To associate your repository with the offensiveterraform topic, visit your repo's landing page and select "manage topics."