Cyber security

Vajra – Your Weapon To Cloud

About Vajra

Vajra is a tool with a graphical user interface that can be used to attack and look around in the Azure environment of a target.

In Indian folklore, Vajra is the name of the weapon of the god of thunder and storms, Indra. Because it works with the cloud, it’s a great name for the tool.

Vajra currently works with Azure and AWS Cloud environments. In the future, it will also work with Google Cloud Platform and some OSINT environments.

Following features are available at the moment:

  • Azure
    • Attacking
      1. OAuth Based Phishing (Illicit Consent Grant Attack)
        • Exfiltrate Data
        • Enumerate Environment
        • Deploy Backdoors
        • Send mails/Create Rules
      2. Password Spray
      3. Password Brute Force
    • Enumeration
      1. Users
      2. Subdomain
      3. Azure Ad
      4. Azure Services
    • Specific Service
      1. Storage Accounts
  • AWS
    • Attacking(In progress)
      1. Under Development
    • Enumeration
      1. IAM Enumeration
      2. S3 Scanner
      3. Under Development
    • Misconfiguration

Note: This tool have been tested in a environment which had around 3 Lakh principals like users, groups, enterprise application, etc.

It features an intuitive web-based user interface built with the Python Flask module for a better user experience.

About Author

Raunak Parmar is an information security professional whose areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development. He has 3+ years of experience in information security. Raunak holds OSWE certification and likes to research new attack methodologies and create open-source tools that can be used during Cloud Security assessments. He has worked extensively on Azure and AWS.

He is the author of Vajra an offensive cloud security tool and has spoken at multiple conferences like NullCon, Defcon, Blackhat, and local meetups.

Social Media Links

Installation

Docker

Pull the image file from dockerhub

docker pull tr0uble1/vajra   

Run Vajra with following and navigate to http://localhost

docker run -p 80:80 -d tr0uble1/vajra

Manually

Run the following command to install all the modules.

pip install -r requirements.txt

Once installed run the following to start the application.

python app.py

How to use Vajra?

A detailed usage guide is available on Documentation section of the Wiki.

Bugs and Feature Requests

Please raise an issue if you encounter a bug or have a feature request.

Contributing

If you want to contribute to a project and make it better, your help is very welcome.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

2 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

3 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago