Skip to content

cado-security/CloudAndContainerCompromiseSimulator

Repository files navigation

Background

This can be used an easy way of simulating a cloud and container compromise - to trigger detections

It is inspired by Florian Roth's APTSimulator

This allows you to trigger detections without running real world malware. Still, do not run this on production systems as it can reduce their security.

How to Run

Copy the files to a Linux system and run:

  • chmod +x ./setup.sh
  • ./setup.sh

You can also clone the repository directly, for example you can run on Amazon Linux like this:

Screenshot

Tools Deployed