{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"terraform-aws-lambda-function-credential-exfiltration","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates Lambda function with existing IAM role. The module invokes it automatically to exfiltrate AWS temporary credential from environment variables and send it back with response.","allTopics":["aws","lambda","aws-lambda","terraform","aws-iam","offensive-security","cyber-security","cloud-security","terraform-module","offensiveterraform"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":1,"issueCount":0,"starsCount":10,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-05-21T23:37:05.104Z"}},{"type":"Public","name":"offensive-terraform.github.io","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform Website","allTopics":["docker","aws","azure","terraform","gcp","offensive-security","terraform-modules","aws-security","cloud-security","azure-security","gcp-security","attack-modules","terraform-security"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":44,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-10-08T05:17:53.956Z"}},{"type":"Public","name":"terraform-aws-ec2-kali-linux","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, ScoutSuite).","allTopics":["aws","security","cloud","ec2","kali-linux","offensive-security","aws-marketplace"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":17,"forksCount":8,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-27T08:05:29.289Z"}},{"type":"Public","name":"terraform-aws-ecs-credential-exfiltration","owner":"offensive-terraform","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-20T19:15:47.644Z"}},{"type":"Public","name":"terraform-aws-ec2-instance-reverse-shell","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.","allTopics":["aws","ec2","reverse-shell","cloud-security","terrraform","ec2-instance","offensiveterraform","attacker-machine"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":17,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-19T23:11:55.288Z"}},{"type":"Public","name":"terraform-aws-s3-subdomain-takeover","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which takes over a subdomain which has a CNAME record pointing to non-existing S3 bucket in target's Route53. The module creates a S3 bucket with a name as subdomain in the specific AWS region that CNAME record is pointing to. Also, it uploads a simple web page with \"404 Page Not Found\" text.","allTopics":["route53","aws","terraform","s3","offensive-security","cloud-security","subdomain-takeover","s3-bucket","subdomain","offensiveterraform","cname-record"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T05:24:00.476Z"}},{"type":"Public","name":"terraform-aws-rds-snapshot-publicly-exposed","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates RDS database from a publicly exposed RDS snapshot in attacker's AWS account. After that, attacker can connect to RDS database and inspect it.","allTopics":["aws","attacker","rds-database","offensiveterraform"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T05:22:56.513Z"}},{"type":"Public","name":"terraform-aws-ebs-snapshot-publicly-exposed","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume \"/usr/src/hack\".","allTopics":["aws","ec2","terraform","offensive-security","cloud-security","ebs-volume","ebs-snapshot","ssh","attacker","ec2-instance","offensiveterraform"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T05:21:40.027Z"}},{"type":"Public","name":"terraform-aws-iam-create-user-persistence","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates IAM user, access key then attaches managed IAM Policy to an IAM user.","allTopics":["aws","terraform","persistence","iam","offensive-security","cloud-security","aws-iam","offensiveterraform","user-persistence"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T05:18:15.800Z"}},{"type":"Public","name":"terraform-aws-ec2-instance-credential-exfiltration","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates EC2 instance and exfiltrate credential from Instance metadata to external URL.","allTopics":["aws","ec2","terraform","iam","offensive-security","exfiltration","cloud-security","instance-metadata","offensiveterraform"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T05:15:08.752Z"}},{"type":"Public","name":"terraform-aws-cross-account-persistence","owner":"offensive-terraform","isFork":false,"description":"Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy to an IAM role.","allTopics":["aws","cloud","backdoor","terraform","persistence","assume-role","cloud-security","iam-role","offensiveterraform","trust-relationship"],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T05:13:12.920Z"}}],"repositoryCount":11,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}