Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ex0dus-0x/sneak
A container/VM malware that finds and exploits SSRF opportunities in a compromised cloud environment
https://github.com/ex0dus-0x/sneak
Last synced: 9 days ago
JSON representation
A container/VM malware that finds and exploits SSRF opportunities in a compromised cloud environment
- Host: GitHub
- URL: https://github.com/ex0dus-0x/sneak
- Owner: ex0dus-0x
- Created: 2022-03-05T22:41:44.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-04-10T06:15:50.000Z (over 2 years ago)
- Last Synced: 2024-06-21T17:52:50.342Z (6 months ago)
- Language: Go
- Homepage: https://codemuch.tech/2022/04/23/supply-chain-counterattack/
- Size: 34.2 KB
- Stars: 9
- Watchers: 3
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# sneak
__NOTE__: as a mini-research + bug bounty project, I uploaded this to be picked up
by supply chain defense pipelines through some malicious packages. If you have come across this, please
[reach out to me](mailto:[email protected]) for next steps!A container/VM "malware" that finds and exploits SSRF opportunities in
a compromised cloud environment.## Introduction
This is a proof-of-concept of a binary that can be dropped in a cloud environment
to leak and exfiltrate sensitive data from the instance metadata service, and
also enumerate for other server-side request forgery (SSRF) opportunities.Supported heuristics:
* Cloud Metadata
* AWS IMDSv1
* Google Cloud
* DigitalOcean
* Microsoft Azure
* Environmental Variables
* Other network services (TODO)