Block or Report
Block or report christophetd
Report abuse
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned
-
CloudFlair Public
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys. -
censys-subdomain-finder Public
⚡ Perform subdomain enumeration using the certificate transparency logs from Censys. -
spoofing-office-macro Public
🐟 PoC of a VBA macro spawning a process with a spoofed parent and command line. -
-
log4shell-vulnerable-app Public
Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.
405 contributions in the last year
Less
More
Contribution activity
January 2022
Created 198 commits in 4 repositories
Created 2 repositories
Opened 14 pull requests in 2 repositories
DataDog/stratus-red-team
13
merged
- Use consistent naming convention for all attack technique IDs
- Attack techniques code cleanup
- Static analysis
- Feature/idempotency
- Add better error handling when the default AWS region is not set
- Add examples and documentation about programmatic usage (closes #40)
- New technique: CloudTrail logs impairement through lifecycle rule
- Brew formula update for stratus-red-team version v0.0.17
- New attack technique: Leave AWS organization
- New attack technique: Backdoor lambda function through resource policy
- New attack technique: Exfiltrate an AMI by Making it Public (closes #17)
- New attack technique: Steal instance credentials from the metadata service
- Add command to revert TTP detonation (closes #12)
RhinoSecurityLabs/cloudgoat
1
merged
Reviewed 1 pull request in 1 repository
RhinoSecurityLabs/cloudgoat
1 pull request
Created an issue in FSecureLABS/leonidas that received 2 comments
CodeBuild deployment step fails
Describe the bug CodeBuild deployment stage failed To Reproduce I copy-pasted commands in the documentation. I'm running as an administrator user i…
2
comments
Opened 60 other issues in 2 repositories
DataDog/stratus-red-team
21
open
38
closed
- Office 365
- CloudCopy
- Auto-generate third-party licenses
- Create GuardDuty archival rule
- Implement MacOS code signing
- Revert function for aws.persistence.backdoor-iam-role
- Support detonating attack techniques against existing infrastructure
- Retrieval of EC2 user data on multiple instances
- Exfiltration through S3 Bucket replication
- Usage of ssm:StartCommand on multiple instances
- Usage of ec2instanceconnect:SendSSHKey on multiple instances
- Usage of sts:GetFederationToken on multiple IAM users
- Document permissions required to run Stratus Red Team, in sandbox account
- Support GCP attack techniques
- Support Azure attack techniques
- Support Kubernetes attack techniques
- Create backlog of future attack techniques
- Add guardduty-tester to the comparison of similar tools
- Add detection leads to attack techniques
- Generate and make available godoc for programmatic usage
- Docs enhancements before open-sourcing
- Add coloring to statuses
- Add more detailed explanation in attack techniques description
- Allow adding arbitrary tags on attack techniques for filtering
- Add note on running in sandbox account
- Some issues not shown.
hashicorp/terraform-provider-aws
1
open
Started 1 discussion in 1 repository
squidfunk/mkdocs-material
squidfunk/mkdocs-material

